Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
GEm3o8pION.exe

Overview

General Information

Sample name:GEm3o8pION.exe
renamed because original name is a hash value
Original sample name:ab8f43d7eb7fe08723fe289589fca3d8.exe
Analysis ID:1575799
MD5:ab8f43d7eb7fe08723fe289589fca3d8
SHA1:6ece10cc6fa39656f4fd874dc291aa2128b96657
SHA256:fbedd9cfc2ef50738d490530264b582325212f701a6a36d24ea1edbfe1fdacc7
Tags:exeuser-abuse_ch
Infos:

Detection

Socks5Systemz
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for submitted file
Yara detected Socks5Systemz
AI detected suspicious sample
Contains functionality to infect the boot sector
Machine Learning detection for dropped file
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • GEm3o8pION.exe (PID: 6468 cmdline: "C:\Users\user\Desktop\GEm3o8pION.exe" MD5: AB8F43D7EB7FE08723FE289589FCA3D8)
    • GEm3o8pION.tmp (PID: 6520 cmdline: "C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp" /SL5="$20456,3338584,56832,C:\Users\user\Desktop\GEm3o8pION.exe" MD5: C82765EEEA3F81F9645CA834132E6A3A)
      • envideojoiner2.exe (PID: 1472 cmdline: "C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe" -i MD5: 563B61FE1BF69C7FA387A085C07ABB31)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\is-SG5N6.tmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      C:\ProgramData\RSVideoJoiner\RSVideoJoiner.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
        SourceRuleDescriptionAuthorStrings
        00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
          00000001.00000002.3291322769.0000000005E10000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
            00000003.00000002.3290651813.0000000002736000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
              00000003.00000000.2053718478.0000000000401000.00000020.00000001.01000000.00000009.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
                Process Memory Space: envideojoiner2.exe PID: 1472JoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
                  SourceRuleDescriptionAuthorStrings
                  3.0.envideojoiner2.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-16T10:41:47.849792+010020287653Unknown Traffic192.168.2.549790188.119.66.185443TCP
                    2024-12-16T10:41:53.680694+010020287653Unknown Traffic192.168.2.549805188.119.66.185443TCP
                    2024-12-16T10:41:56.058410+010020287653Unknown Traffic192.168.2.549814188.119.66.185443TCP
                    2024-12-16T10:41:58.729813+010020287653Unknown Traffic192.168.2.549821188.119.66.185443TCP
                    2024-12-16T10:42:01.010077+010020287653Unknown Traffic192.168.2.549827188.119.66.185443TCP
                    2024-12-16T10:42:03.269707+010020287653Unknown Traffic192.168.2.549833188.119.66.185443TCP
                    2024-12-16T10:42:05.709977+010020287653Unknown Traffic192.168.2.549838188.119.66.185443TCP
                    2024-12-16T10:42:08.148825+010020287653Unknown Traffic192.168.2.549842188.119.66.185443TCP
                    2024-12-16T10:42:10.428244+010020287653Unknown Traffic192.168.2.549849188.119.66.185443TCP
                    2024-12-16T10:42:12.731929+010020287653Unknown Traffic192.168.2.549855188.119.66.185443TCP
                    2024-12-16T10:42:15.049558+010020287653Unknown Traffic192.168.2.549861188.119.66.185443TCP
                    2024-12-16T10:42:17.321601+010020287653Unknown Traffic192.168.2.549867188.119.66.185443TCP
                    2024-12-16T10:42:19.582294+010020287653Unknown Traffic192.168.2.549873188.119.66.185443TCP
                    2024-12-16T10:42:22.018623+010020287653Unknown Traffic192.168.2.549879188.119.66.185443TCP
                    2024-12-16T10:42:24.272025+010020287653Unknown Traffic192.168.2.549885188.119.66.185443TCP
                    2024-12-16T10:42:26.535707+010020287653Unknown Traffic192.168.2.549894188.119.66.185443TCP
                    2024-12-16T10:42:28.810935+010020287653Unknown Traffic192.168.2.549899188.119.66.185443TCP
                    2024-12-16T10:42:31.069948+010020287653Unknown Traffic192.168.2.549906188.119.66.185443TCP
                    2024-12-16T10:42:33.320323+010020287653Unknown Traffic192.168.2.549912188.119.66.185443TCP
                    2024-12-16T10:42:35.664778+010020287653Unknown Traffic192.168.2.549918188.119.66.185443TCP
                    2024-12-16T10:42:37.928582+010020287653Unknown Traffic192.168.2.549924188.119.66.185443TCP
                    2024-12-16T10:42:40.181929+010020287653Unknown Traffic192.168.2.549930188.119.66.185443TCP
                    2024-12-16T10:42:42.465890+010020287653Unknown Traffic192.168.2.549936188.119.66.185443TCP
                    2024-12-16T10:42:44.739813+010020287653Unknown Traffic192.168.2.549942188.119.66.185443TCP
                    2024-12-16T10:42:47.280932+010020287653Unknown Traffic192.168.2.549948188.119.66.185443TCP
                    2024-12-16T10:42:49.730065+010020287653Unknown Traffic192.168.2.549955188.119.66.185443TCP
                    2024-12-16T10:42:51.989102+010020287653Unknown Traffic192.168.2.549962188.119.66.185443TCP
                    2024-12-16T10:42:54.435847+010020287653Unknown Traffic192.168.2.549968188.119.66.185443TCP
                    2024-12-16T10:42:56.694464+010020287653Unknown Traffic192.168.2.549974188.119.66.185443TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-16T10:41:48.643660+010028032742Potentially Bad Traffic192.168.2.549790188.119.66.185443TCP
                    2024-12-16T10:41:54.393155+010028032742Potentially Bad Traffic192.168.2.549805188.119.66.185443TCP
                    2024-12-16T10:41:56.759239+010028032742Potentially Bad Traffic192.168.2.549814188.119.66.185443TCP
                    2024-12-16T10:41:59.440170+010028032742Potentially Bad Traffic192.168.2.549821188.119.66.185443TCP
                    2024-12-16T10:42:01.693205+010028032742Potentially Bad Traffic192.168.2.549827188.119.66.185443TCP
                    2024-12-16T10:42:03.949692+010028032742Potentially Bad Traffic192.168.2.549833188.119.66.185443TCP
                    2024-12-16T10:42:06.390924+010028032742Potentially Bad Traffic192.168.2.549838188.119.66.185443TCP
                    2024-12-16T10:42:08.840693+010028032742Potentially Bad Traffic192.168.2.549842188.119.66.185443TCP
                    2024-12-16T10:42:11.108600+010028032742Potentially Bad Traffic192.168.2.549849188.119.66.185443TCP
                    2024-12-16T10:42:13.476029+010028032742Potentially Bad Traffic192.168.2.549855188.119.66.185443TCP
                    2024-12-16T10:42:15.746154+010028032742Potentially Bad Traffic192.168.2.549861188.119.66.185443TCP
                    2024-12-16T10:42:18.004099+010028032742Potentially Bad Traffic192.168.2.549867188.119.66.185443TCP
                    2024-12-16T10:42:20.263857+010028032742Potentially Bad Traffic192.168.2.549873188.119.66.185443TCP
                    2024-12-16T10:42:22.701377+010028032742Potentially Bad Traffic192.168.2.549879188.119.66.185443TCP
                    2024-12-16T10:42:24.957137+010028032742Potentially Bad Traffic192.168.2.549885188.119.66.185443TCP
                    2024-12-16T10:42:27.217547+010028032742Potentially Bad Traffic192.168.2.549894188.119.66.185443TCP
                    2024-12-16T10:42:29.491808+010028032742Potentially Bad Traffic192.168.2.549899188.119.66.185443TCP
                    2024-12-16T10:42:31.749882+010028032742Potentially Bad Traffic192.168.2.549906188.119.66.185443TCP
                    2024-12-16T10:42:34.004464+010028032742Potentially Bad Traffic192.168.2.549912188.119.66.185443TCP
                    2024-12-16T10:42:36.347102+010028032742Potentially Bad Traffic192.168.2.549918188.119.66.185443TCP
                    2024-12-16T10:42:38.610462+010028032742Potentially Bad Traffic192.168.2.549924188.119.66.185443TCP
                    2024-12-16T10:42:40.862435+010028032742Potentially Bad Traffic192.168.2.549930188.119.66.185443TCP
                    2024-12-16T10:42:43.173036+010028032742Potentially Bad Traffic192.168.2.549936188.119.66.185443TCP
                    2024-12-16T10:42:45.428387+010028032742Potentially Bad Traffic192.168.2.549942188.119.66.185443TCP
                    2024-12-16T10:42:47.961149+010028032742Potentially Bad Traffic192.168.2.549948188.119.66.185443TCP
                    2024-12-16T10:42:50.411398+010028032742Potentially Bad Traffic192.168.2.549955188.119.66.185443TCP
                    2024-12-16T10:42:52.672393+010028032742Potentially Bad Traffic192.168.2.549962188.119.66.185443TCP
                    2024-12-16T10:42:55.115256+010028032742Potentially Bad Traffic192.168.2.549968188.119.66.185443TCP
                    2024-12-16T10:42:57.430024+010028032742Potentially Bad Traffic192.168.2.549974188.119.66.185443TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: https://188.119.66.185/ai/?key=8f3f2b3aeAvira URL Cloud: Label: malware
                    Source: https://188.119.66.185/ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4Avira URL Cloud: Label: malware
                    Source: https://188.119.66.185/ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955eAvira URL Cloud: Label: malware
                    Source: https://188.119.66.185/ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b82a8dcd6c946851e300888b3250aa15d005633775b0e650f3ba1e9c95b1c92975ccf55bc592fe5a818ece02a1b7e2984c57cad7021dda30201bd2318fAvira URL Cloud: Label: malware
                    Source: GEm3o8pION.exeReversingLabs: Detection: 34%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
                    Source: C:\ProgramData\RSVideoJoiner\RSVideoJoiner.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_0045D188 GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion,1_2_0045D188
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_0045D254 ArcFourCrypt,1_2_0045D254
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_0045D23C ArcFourCrypt,1_2_0045D23C
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_10001000 ISCryptGetVersion,1_2_10001000
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_10001130 ArcFourCrypt,1_2_10001130

                    Compliance

                    barindex
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeUnpacked PE file: 3.2.envideojoiner2.exe.400000.0.unpack
                    Source: GEm3o8pION.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Rollsoft Video Joiner_is1Jump to behavior
                    Source: unknownHTTPS traffic detected: 188.119.66.185:443 -> 192.168.2.5:49790 version: TLS 1.2
                    Source: Binary string: msvcp71.pdbx# source: is-IA7V3.tmp.1.dr
                    Source: Binary string: msvcr71.pdb< source: is-K12JE.tmp.1.dr
                    Source: Binary string: msvcp71.pdb source: is-IA7V3.tmp.1.dr
                    Source: Binary string: MicrosoftWindowsGdiPlus-1.0.2600.1360-gdiplus.pdb source: is-I2N1D.tmp.1.dr
                    Source: Binary string: msvcr71.pdb source: is-K12JE.tmp.1.dr
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00452A60 FindFirstFileA,GetLastError,1_2_00452A60
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00474F88 FindFirstFileA,FindNextFileA,FindClose,1_2_00474F88
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004980A4 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_004980A4
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00464158 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464158
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00462750 FindFirstFileA,FindNextFileA,FindClose,1_2_00462750
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00463CDC SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463CDC
                    Source: global trafficTCP traffic: 192.168.2.5:49796 -> 31.214.157.206:2024
                    Source: Joe Sandbox ViewIP Address: 31.214.157.206 31.214.157.206
                    Source: Joe Sandbox ViewIP Address: 188.119.66.185 188.119.66.185
                    Source: Joe Sandbox ViewJA3 fingerprint: 51c64c77e60f3980eea90869b68c58a8
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49790 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49805 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49814 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49827 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49833 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49855 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49861 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49838 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49849 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49821 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49894 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49885 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49918 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49899 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49930 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49912 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49842 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49936 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49962 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49942 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49867 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49948 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49955 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49906 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49968 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49879 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49974 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49924 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49873 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49805 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49833 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49814 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49827 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49894 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49942 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49879 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49821 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49867 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49885 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49842 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49861 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49962 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49855 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49948 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49906 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49790 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49838 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49924 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49936 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49912 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49849 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49873 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49899 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49955 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49968 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49930 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49974 -> 188.119.66.185:443
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49918 -> 188.119.66.185:443
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b82a8dcd6c946851e300888b3250aa15d005633775b0e650f3ba1e9c95b1c92975ccf55bc592fe5a818ece02a1b7e2984c57cad7021dda30201bd2318f HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 31.214.157.206
                    Source: unknownTCP traffic detected without corresponding DNS query: 31.214.157.206
                    Source: unknownTCP traffic detected without corresponding DNS query: 31.214.157.206
                    Source: unknownTCP traffic detected without corresponding DNS query: 31.214.157.206
                    Source: unknownTCP traffic detected without corresponding DNS query: 31.214.157.206
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 31.214.157.206
                    Source: unknownTCP traffic detected without corresponding DNS query: 31.214.157.206
                    Source: unknownTCP traffic detected without corresponding DNS query: 31.214.157.206
                    Source: unknownTCP traffic detected without corresponding DNS query: 31.214.157.206
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 31.214.157.206
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_02C72B95 WSASetLastError,WSARecv,WSASetLastError,select,3_2_02C72B95
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b82a8dcd6c946851e300888b3250aa15d005633775b0e650f3ba1e9c95b1c92975ccf55bc592fe5a818ece02a1b7e2984c57cad7021dda30201bd2318f HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                    Source: GEm3o8pION.tmp, 00000001.00000002.3291322769.0000000005EDF000.00000004.00001000.00020000.00000000.sdmp, envideojoiner2.exe, 00000003.00000000.2054007794.00000000004D5000.00000002.00000001.01000000.00000009.sdmp, RSVideoJoiner.exe.3.dr, envideojoiner2.exe.1.dr, is-SG5N6.tmp.1.drString found in binary or memory: http://wonderwork.ucoz.com/
                    Source: GEm3o8pION.tmp, GEm3o8pION.tmp, 00000001.00000000.2037814779.0000000000401000.00000020.00000001.01000000.00000004.sdmp, GEm3o8pION.tmp.0.dr, is-QRTQ3.tmp.1.drString found in binary or memory: http://www.innosetup.com/
                    Source: GEm3o8pION.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline
                    Source: GEm3o8pION.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
                    Source: GEm3o8pION.exe, 00000000.00000003.2037337872.0000000002188000.00000004.00001000.00020000.00000000.sdmp, GEm3o8pION.exe, 00000000.00000003.2037125510.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, GEm3o8pION.tmp, GEm3o8pION.tmp, 00000001.00000000.2037814779.0000000000401000.00000020.00000001.01000000.00000004.sdmp, GEm3o8pION.tmp.0.dr, is-QRTQ3.tmp.1.drString found in binary or memory: http://www.remobjects.com/ps
                    Source: GEm3o8pION.exe, 00000000.00000003.2037337872.0000000002188000.00000004.00001000.00020000.00000000.sdmp, GEm3o8pION.exe, 00000000.00000003.2037125510.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, GEm3o8pION.tmp, 00000001.00000000.2037814779.0000000000401000.00000020.00000001.01000000.00000004.sdmp, GEm3o8pION.tmp.0.dr, is-QRTQ3.tmp.1.drString found in binary or memory: http://www.remobjects.com/psU
                    Source: envideojoiner2.exe, 00000003.00000002.3289823562.00000000009D2000.00000004.00000020.00020000.00000000.sdmp, envideojoiner2.exe, 00000003.00000002.3289823562.00000000009BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/
                    Source: envideojoiner2.exe, 00000003.00000002.3289823562.00000000009D2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/405117-2476756634-1003
                    Source: envideojoiner2.exe, 00000003.00000002.3289823562.00000000009BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/R
                    Source: envideojoiner2.exe, 00000003.00000002.3289823562.00000000009B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/ai/?key=8f3f2b3ae
                    Source: envideojoiner2.exe, 00000003.00000002.3289823562.00000000009D2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b82a8dcd6c946851e300888b325
                    Source: envideojoiner2.exe, 00000003.00000002.3291386968.000000000335E000.00000004.00000020.00020000.00000000.sdmp, envideojoiner2.exe, 00000003.00000002.3289823562.00000000009D2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4
                    Source: envideojoiner2.exe, 00000003.00000002.3289823562.00000000009D2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/en-GB
                    Source: envideojoiner2.exe, 00000003.00000002.3289823562.00000000009D2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/mCertificates
                    Source: envideojoiner2.exe, 00000003.00000002.3289823562.00000000009D2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/ography
                    Source: envideojoiner2.exe, 00000003.00000002.3289823562.00000000009D2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/priseCertificates
                    Source: envideojoiner2.exe, 00000003.00000002.3289823562.00000000009D2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/rosoft
                    Source: GEm3o8pION.exe, 00000000.00000003.2036233020.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, GEm3o8pION.exe, 00000000.00000003.2036354509.0000000002181000.00000004.00001000.00020000.00000000.sdmp, GEm3o8pION.exe, 00000000.00000002.3289847970.0000000002181000.00000004.00001000.00020000.00000000.sdmp, GEm3o8pION.tmp, 00000001.00000003.2039779041.0000000002268000.00000004.00001000.00020000.00000000.sdmp, GEm3o8pION.tmp, 00000001.00000003.2039601389.0000000003230000.00000004.00001000.00020000.00000000.sdmp, GEm3o8pION.tmp, 00000001.00000002.3290434003.0000000002268000.00000004.00001000.00020000.00000000.sdmp, GEm3o8pION.tmp, 00000001.00000002.3289865233.0000000000629000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.easycutstudio.com/support.html
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49942
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49842 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49861
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49968 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49894 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49912 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49833 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49942 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49906 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49936
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49849 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49885 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49855
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49899
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49930
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49974
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49894
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49879 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49936 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49827 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49855 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49849
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49861 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49924
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49968
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49924 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49842
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49885
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49962
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49821 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49918 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49873 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49930 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49918
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49879
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49912
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49955
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49833
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49948 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49873
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49899 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49962 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49955 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49906
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49827
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49948
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49867 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49867
                    Source: unknownHTTPS traffic detected: 188.119.66.185:443 -> 192.168.2.5:49790 version: TLS 1.2
                    Source: is-I2N1D.tmp.1.drBinary or memory string: DirectDrawCreateExmemstr_b0736082-b
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_0042F520 NtdllDefWindowProc_A,1_2_0042F520
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00423B84 NtdllDefWindowProc_A,1_2_00423B84
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004125D8 NtdllDefWindowProc_A,1_2_004125D8
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00478AC0 NtdllDefWindowProc_A,1_2_00478AC0
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00457594 PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,1_2_00457594
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_0042E934: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,1_2_0042E934
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004555E4 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555E4
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeCode function: 0_2_0040840C0_2_0040840C
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004706A81_2_004706A8
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004809F71_2_004809F7
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004352C81_2_004352C8
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004673A41_2_004673A4
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_0043DD501_2_0043DD50
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_0043035C1_2_0043035C
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004444C81_2_004444C8
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004345C41_2_004345C4
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00444A701_2_00444A70
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00486BD01_2_00486BD0
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00430EE81_2_00430EE8
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_0045F0C41_2_0045F0C4
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004451681_2_00445168
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_0045B1741_2_0045B174
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004694041_2_00469404
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004455741_2_00445574
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004519BC1_2_004519BC
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00487B301_2_00487B30
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_0048DF541_2_0048DF54
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_004010003_2_00401000
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_004067B73_2_004067B7
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_609660FA3_2_609660FA
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6092114F3_2_6092114F
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6091F2C93_2_6091F2C9
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6096923E3_2_6096923E
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6093323D3_2_6093323D
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6095C3143_2_6095C314
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_609503123_2_60950312
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6094D33B3_2_6094D33B
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6093B3683_2_6093B368
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6096748C3_2_6096748C
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6093F42E3_2_6093F42E
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_609544703_2_60954470
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_609615FA3_2_609615FA
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6096A5EE3_2_6096A5EE
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6096D6A43_2_6096D6A4
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_609606A83_2_609606A8
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_609326543_2_60932654
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_609556653_2_60955665
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6094B7DB3_2_6094B7DB
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6092F74D3_2_6092F74D
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_609648073_2_60964807
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6094E9BC3_2_6094E9BC
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_609379293_2_60937929
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6093FAD63_2_6093FAD6
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6096DAE83_2_6096DAE8
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6094DA3A3_2_6094DA3A
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_60936B273_2_60936B27
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_60954CF63_2_60954CF6
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_60950C6B3_2_60950C6B
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_60966DF13_2_60966DF1
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_60963D353_2_60963D35
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_60909E9C3_2_60909E9C
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_60951E863_2_60951E86
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_60912E0B3_2_60912E0B
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_60954FF83_2_60954FF8
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_02C8BAED3_2_02C8BAED
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_02C92A703_2_02C92A70
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_02C8D31F3_2_02C8D31F
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_02C870B03_2_02C870B0
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_02C7E0793_2_02C7E079
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_02C9266D3_2_02C9266D
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_02C8BF053_2_02C8BF05
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_02C8873A3_2_02C8873A
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_02C8B5F93_2_02C8B5F9
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_02C90DA43_2_02C90DA4
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_02CA94B33_2_02CA94B3
                    Source: Joe Sandbox ViewDropped File: C:\ProgramData\RSVideoJoiner\sqlite3.dll 16574F51785B0E2FC29C2C61477EB47BB39F714829999511DC8952B43AB17660
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: String function: 00408C0C appears 45 times
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: String function: 00406AC4 appears 43 times
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: String function: 0040595C appears 117 times
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: String function: 00457F1C appears 73 times
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: String function: 00403400 appears 60 times
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: String function: 00445DD4 appears 45 times
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: String function: 00457D10 appears 96 times
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: String function: 004344DC appears 32 times
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: String function: 004078F4 appears 43 times
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: String function: 00403494 appears 83 times
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: String function: 00403684 appears 225 times
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: String function: 00453344 appears 97 times
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: String function: 004460A4 appears 59 times
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: String function: 02C87750 appears 32 times
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: String function: 02C92A00 appears 135 times
                    Source: GEm3o8pION.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                    Source: GEm3o8pION.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                    Source: GEm3o8pION.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
                    Source: is-QRTQ3.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                    Source: is-QRTQ3.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                    Source: is-QRTQ3.tmp.1.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
                    Source: sqlite3.dll.3.drStatic PE information: Number of sections : 19 > 10
                    Source: is-45SUG.tmp.1.drStatic PE information: Number of sections : 19 > 10
                    Source: GEm3o8pION.exe, 00000000.00000003.2037337872.0000000002188000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs GEm3o8pION.exe
                    Source: GEm3o8pION.exe, 00000000.00000003.2037125510.00000000023B0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs GEm3o8pION.exe
                    Source: GEm3o8pION.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                    Source: classification engineClassification label: mal92.troj.evad.winEXE@5/30@0/2
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_02C7F8C0 _memset,FormatMessageA,GetLastError,FormatMessageA,GetLastError,3_2_02C7F8C0
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004555E4 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555E4
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00455E0C GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,1_2_00455E0C
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: CreateServiceA,3_2_0040D785
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_0046E0E4 GetVersion,CoCreateInstance,1_2_0046E0E4
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeCode function: 0_2_00409C34 FindResourceA,SizeofResource,LoadResource,LockResource,0_2_00409C34
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_0040D6CF StartServiceCtrlDispatcherA,3_2_0040D6CF
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_0040D6CF StartServiceCtrlDispatcherA,3_2_0040D6CF
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeFile created: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmpJump to behavior
                    Source: Yara matchFile source: 3.0.envideojoiner2.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.3291322769.0000000005E10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000000.2053718478.0000000000401000.00000020.00000001.01000000.00000009.sdmp, type: MEMORY
                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe, type: DROPPED
                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\is-SG5N6.tmp, type: DROPPED
                    Source: Yara matchFile source: C:\ProgramData\RSVideoJoiner\RSVideoJoiner.exe, type: DROPPED
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpFile read: C:\Windows\win.iniJump to behavior
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
                    Source: envideojoiner2.exe, envideojoiner2.exe, 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, envideojoiner2.exe, 00000003.00000003.2056422986.000000000090D000.00000004.00000020.00020000.00000000.sdmp, is-45SUG.tmp.1.dr, sqlite3.dll.3.drBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                    Source: envideojoiner2.exe, 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, envideojoiner2.exe, 00000003.00000003.2056422986.000000000090D000.00000004.00000020.00020000.00000000.sdmp, is-45SUG.tmp.1.dr, sqlite3.dll.3.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                    Source: envideojoiner2.exe, envideojoiner2.exe, 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, envideojoiner2.exe, 00000003.00000003.2056422986.000000000090D000.00000004.00000020.00020000.00000000.sdmp, is-45SUG.tmp.1.dr, sqlite3.dll.3.drBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
                    Source: envideojoiner2.exe, 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, envideojoiner2.exe, 00000003.00000003.2056422986.000000000090D000.00000004.00000020.00020000.00000000.sdmp, is-45SUG.tmp.1.dr, sqlite3.dll.3.drBinary or memory string: CREATE TABLE "%w"."%w_node"(nodeno INTEGER PRIMARY KEY, data BLOB);CREATE TABLE "%w"."%w_rowid"(rowid INTEGER PRIMARY KEY, nodeno INTEGER);CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY, parentnode INTEGER);INSERT INTO '%q'.'%q_node' VALUES(1, zeroblob(%d))
                    Source: envideojoiner2.exe, 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, envideojoiner2.exe, 00000003.00000003.2056422986.000000000090D000.00000004.00000020.00020000.00000000.sdmp, is-45SUG.tmp.1.dr, sqlite3.dll.3.drBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
                    Source: envideojoiner2.exe, 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, envideojoiner2.exe, 00000003.00000003.2056422986.000000000090D000.00000004.00000020.00020000.00000000.sdmp, is-45SUG.tmp.1.dr, sqlite3.dll.3.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
                    Source: envideojoiner2.exe, 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, envideojoiner2.exe, 00000003.00000003.2056422986.000000000090D000.00000004.00000020.00020000.00000000.sdmp, is-45SUG.tmp.1.dr, sqlite3.dll.3.drBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
                    Source: envideojoiner2.exe, 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, envideojoiner2.exe, 00000003.00000003.2056422986.000000000090D000.00000004.00000020.00020000.00000000.sdmp, is-45SUG.tmp.1.dr, sqlite3.dll.3.drBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                    Source: envideojoiner2.exe, 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, envideojoiner2.exe, 00000003.00000003.2056422986.000000000090D000.00000004.00000020.00020000.00000000.sdmp, is-45SUG.tmp.1.dr, sqlite3.dll.3.drBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                    Source: envideojoiner2.exe, 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, envideojoiner2.exe, 00000003.00000003.2056422986.000000000090D000.00000004.00000020.00020000.00000000.sdmp, is-45SUG.tmp.1.dr, sqlite3.dll.3.drBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
                    Source: envideojoiner2.exe, 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, envideojoiner2.exe, 00000003.00000003.2056422986.000000000090D000.00000004.00000020.00020000.00000000.sdmp, is-45SUG.tmp.1.dr, sqlite3.dll.3.drBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                    Source: envideojoiner2.exe, envideojoiner2.exe, 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, envideojoiner2.exe, 00000003.00000003.2056422986.000000000090D000.00000004.00000020.00020000.00000000.sdmp, is-45SUG.tmp.1.dr, sqlite3.dll.3.drBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                    Source: GEm3o8pION.exeReversingLabs: Detection: 34%
                    Source: GEm3o8pION.exeString found in binary or memory: need to be updated. /RESTARTAPPLICATIONS Instructs Setup to restart applications. /NORESTARTAPPLICATIONS Prevents Setup from restarting applications. /LOADINF="filename" Instructs Setup to load the settings from the specified file after having checked t
                    Source: GEm3o8pION.exeString found in binary or memory: /LOADINF="filename"
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeFile read: C:\Users\user\Desktop\GEm3o8pION.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\GEm3o8pION.exe "C:\Users\user\Desktop\GEm3o8pION.exe"
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeProcess created: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp "C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp" /SL5="$20456,3338584,56832,C:\Users\user\Desktop\GEm3o8pION.exe"
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpProcess created: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe "C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe" -i
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeProcess created: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp "C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp" /SL5="$20456,3338584,56832,C:\Users\user\Desktop\GEm3o8pION.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpProcess created: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe "C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe" -iJump to behavior
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: textinputframework.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: coreuicomponents.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: shfolder.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: msacm32.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: winmmbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: winmmbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: riched20.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: usp10.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: msls31.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: explorerframe.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: sfc.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpSection loaded: sfc_os.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: sqlite3.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpWindow found: window name: TMainFormJump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Rollsoft Video Joiner_is1Jump to behavior
                    Source: GEm3o8pION.exeStatic file information: File size 3587641 > 1048576
                    Source: Binary string: msvcp71.pdbx# source: is-IA7V3.tmp.1.dr
                    Source: Binary string: msvcr71.pdb< source: is-K12JE.tmp.1.dr
                    Source: Binary string: msvcp71.pdb source: is-IA7V3.tmp.1.dr
                    Source: Binary string: MicrosoftWindowsGdiPlus-1.0.2600.1360-gdiplus.pdb source: is-I2N1D.tmp.1.dr
                    Source: Binary string: msvcr71.pdb source: is-K12JE.tmp.1.dr

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeUnpacked PE file: 3.2.envideojoiner2.exe.400000.0.unpack _aett_8:ER;_aftt_8:R;_agtt_8:W;.rsrc:R;_ahtt_8:EW; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeUnpacked PE file: 3.2.envideojoiner2.exe.400000.0.unpack
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004502C0 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_004502C0
                    Source: initial sampleStatic PE information: section where entry point is pointing to: _aett_8
                    Source: envideojoiner2.exe.1.drStatic PE information: section name: _aett_8
                    Source: envideojoiner2.exe.1.drStatic PE information: section name: _aftt_8
                    Source: envideojoiner2.exe.1.drStatic PE information: section name: _agtt_8
                    Source: envideojoiner2.exe.1.drStatic PE information: section name: _ahtt_8
                    Source: is-45SUG.tmp.1.drStatic PE information: section name: /4
                    Source: is-45SUG.tmp.1.drStatic PE information: section name: /19
                    Source: is-45SUG.tmp.1.drStatic PE information: section name: /35
                    Source: is-45SUG.tmp.1.drStatic PE information: section name: /51
                    Source: is-45SUG.tmp.1.drStatic PE information: section name: /63
                    Source: is-45SUG.tmp.1.drStatic PE information: section name: /77
                    Source: is-45SUG.tmp.1.drStatic PE information: section name: /89
                    Source: is-45SUG.tmp.1.drStatic PE information: section name: /102
                    Source: is-45SUG.tmp.1.drStatic PE information: section name: /113
                    Source: is-45SUG.tmp.1.drStatic PE information: section name: /124
                    Source: is-I2N1D.tmp.1.drStatic PE information: section name: Shared
                    Source: RSVideoJoiner.exe.3.drStatic PE information: section name: _aett_8
                    Source: RSVideoJoiner.exe.3.drStatic PE information: section name: _aftt_8
                    Source: RSVideoJoiner.exe.3.drStatic PE information: section name: _agtt_8
                    Source: RSVideoJoiner.exe.3.drStatic PE information: section name: _ahtt_8
                    Source: sqlite3.dll.3.drStatic PE information: section name: /4
                    Source: sqlite3.dll.3.drStatic PE information: section name: /19
                    Source: sqlite3.dll.3.drStatic PE information: section name: /35
                    Source: sqlite3.dll.3.drStatic PE information: section name: /51
                    Source: sqlite3.dll.3.drStatic PE information: section name: /63
                    Source: sqlite3.dll.3.drStatic PE information: section name: /77
                    Source: sqlite3.dll.3.drStatic PE information: section name: /89
                    Source: sqlite3.dll.3.drStatic PE information: section name: /102
                    Source: sqlite3.dll.3.drStatic PE information: section name: /113
                    Source: sqlite3.dll.3.drStatic PE information: section name: /124
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeCode function: 0_2_004065C8 push 00406605h; ret 0_2_004065FD
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeCode function: 0_2_00408104 push ecx; mov dword ptr [esp], eax0_2_00408109
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeCode function: 0_2_0040C218 push eax; ret 0_2_0040C219
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeCode function: 0_2_00408F38 push 00408F6Bh; ret 0_2_00408F63
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_0040994C push 00409989h; ret 1_2_00409981
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00483F88 push 00484096h; ret 1_2_0048408E
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004062B4 push ecx; mov dword ptr [esp], eax1_2_004062B5
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004104E0 push ecx; mov dword ptr [esp], edx1_2_004104E5
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00412928 push 0041298Bh; ret 1_2_00412983
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00494CAC push ecx; mov dword ptr [esp], ecx1_2_00494CB1
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_0040CE38 push ecx; mov dword ptr [esp], edx1_2_0040CE3A
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004592D0 push 00459314h; ret 1_2_0045930C
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_0040F398 push ecx; mov dword ptr [esp], edx1_2_0040F39A
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00443440 push ecx; mov dword ptr [esp], ecx1_2_00443444
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_0040546D push eax; ret 1_2_004054A9
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_0040553D push 00405749h; ret 1_2_00405741
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004055BE push 00405749h; ret 1_2_00405741
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00485678 push ecx; mov dword ptr [esp], ecx1_2_0048567D
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_0040563B push 00405749h; ret 1_2_00405741
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004056A0 push 00405749h; ret 1_2_00405741
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004517F8 push 0045182Bh; ret 1_2_00451823
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004519BC push ecx; mov dword ptr [esp], eax1_2_004519C1
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00477B08 push ecx; mov dword ptr [esp], edx1_2_00477B09
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00419C28 push ecx; mov dword ptr [esp], ecx1_2_00419C2D
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_0045FD1C push ecx; mov dword ptr [esp], ecx1_2_0045FD20
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00499D30 pushad ; retf 1_2_00499D3F
                    Source: envideojoiner2.exe.1.drStatic PE information: section name: _aett_8 entropy: 7.749311372576657
                    Source: RSVideoJoiner.exe.3.drStatic PE information: section name: _aett_8 entropy: 7.749311372576657

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive03_2_02C7E8A2
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpFile created: C:\Users\user\AppData\Local\Temp\is-7V0SN.tmp\_isetup\_iscrypt.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpFile created: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\uninstall\is-QRTQ3.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpFile created: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\ltkrn13n.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpFile created: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\is-LB3A8.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpFile created: C:\Users\user\AppData\Local\Temp\is-7V0SN.tmp\_isetup\_setup64.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpFile created: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\is-F8HGG.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpFile created: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpFile created: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\is-K12JE.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpFile created: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\is-I2N1D.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpFile created: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\is-O97I8.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpFile created: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\sqlite3.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpFile created: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\msvcp71.dll (copy)Jump to dropped file
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeFile created: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpFile created: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\gdiplus.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpFile created: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\LTDIS13n.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeFile created: C:\ProgramData\RSVideoJoiner\RSVideoJoiner.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpFile created: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\is-45SUG.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpFile created: C:\Users\user\AppData\Local\Temp\is-7V0SN.tmp\_isetup\_shfoldr.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpFile created: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\is-IA7V3.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeFile created: C:\ProgramData\RSVideoJoiner\sqlite3.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpFile created: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpFile created: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\msvcr71.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpFile created: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\uninstall\unins000.exe (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeFile created: C:\ProgramData\RSVideoJoiner\RSVideoJoiner.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeFile created: C:\ProgramData\RSVideoJoiner\sqlite3.dllJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive03_2_02C7E8A2
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_0040D6CF StartServiceCtrlDispatcherA,3_2_0040D6CF
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00423C0C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C0C
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00423C0C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C0C
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004241DC IsIconic,SetActiveWindow,SetFocus,1_2_004241DC
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00424194 IsIconic,SetActiveWindow,1_2_00424194
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00418384 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,1_2_00418384
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_0042285C SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,1_2_0042285C
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00417598 IsIconic,GetCapture,1_2_00417598
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_0048393C IsIconic,GetWindowLongA,ShowWindow,ShowWindow,1_2_0048393C
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00417CCE IsIconic,SetWindowPos,1_2_00417CCE
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00417CD0 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,1_2_00417CD0
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_0041F118 GetVersion,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_0041F118
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,3_2_02C7E9A6
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeWindow / User API: threadDelayed 9620Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-7V0SN.tmp\_isetup\_iscrypt.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\uninstall\is-QRTQ3.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\ltkrn13n.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\is-LB3A8.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-7V0SN.tmp\_isetup\_setup64.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\is-F8HGG.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\is-K12JE.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\is-I2N1D.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\is-O97I8.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\msvcp71.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\gdiplus.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\LTDIS13n.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\is-45SUG.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\is-IA7V3.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-7V0SN.tmp\_isetup\_shfoldr.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\msvcr71.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\uninstall\unins000.exe (copy)Jump to dropped file
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-5973
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeAPI coverage: 4.8 %
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe TID: 1988Thread sleep count: 300 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe TID: 1988Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe TID: 4708Thread sleep time: -1380000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe TID: 1988Thread sleep count: 9620 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe TID: 1988Thread sleep time: -19240000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeFile opened: PhysicalDrive0Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00452A60 FindFirstFileA,GetLastError,1_2_00452A60
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00474F88 FindFirstFileA,FindNextFileA,FindClose,1_2_00474F88
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004980A4 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_004980A4
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00464158 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464158
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00462750 FindFirstFileA,FindNextFileA,FindClose,1_2_00462750
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00463CDC SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463CDC
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeCode function: 0_2_00409B78 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_00409B78
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeThread delayed: delay time: 60000Jump to behavior
                    Source: envideojoiner2.exe, 00000003.00000002.3291386968.0000000003350000.00000004.00000020.00020000.00000000.sdmp, envideojoiner2.exe, 00000003.00000002.3289823562.00000000008F8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeAPI call chain: ExitProcess graph end nodegraph_0-6770
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeAPI call chain: ExitProcess graph end nodegraph_3-61164
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_02C880F0 IsDebuggerPresent,3_2_02C880F0
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_02C8E6AE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,3_2_02C8E6AE
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004502C0 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_004502C0
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_02C75E59 RtlInitializeCriticalSection,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_memset,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,_memset,_memset,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,_memset,_memset,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,3_2_02C75E59
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_02C880DA SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_02C880DA
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_00478504 ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,1_2_00478504
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_0042E09C AllocateAndInitializeSid,GetVersion,GetModuleHandleA,GetProcAddress,CheckTokenMembership,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,GetTokenInformation,EqualSid,CloseHandle,FreeSid,1_2_0042E09C
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_02C7E85A cpuid 3_2_02C7E85A
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeCode function: GetLocaleInfoA,0_2_0040520C
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeCode function: GetLocaleInfoA,0_2_00405258
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: GetLocaleInfoA,1_2_00408568
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: GetLocaleInfoA,1_2_004085B4
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_004585C8 GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,1_2_004585C8
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
                    Source: C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmpCode function: 1_2_0045559C GetUserNameA,1_2_0045559C
                    Source: C:\Users\user\Desktop\GEm3o8pION.exeCode function: 0_2_00405CF4 GetVersionExA,0_2_00405CF4

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3290651813.0000000002736000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: envideojoiner2.exe PID: 1472, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3290651813.0000000002736000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: envideojoiner2.exe PID: 1472, type: MEMORYSTR
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_609660FA sqlite3_finalize,sqlite3_free,sqlite3_value_numeric_type,sqlite3_value_numeric_type,sqlite3_value_text,sqlite3_value_int,memcmp,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_strnicmp,sqlite3_mprintf,sqlite3_mprintf,sqlite3_malloc,sqlite3_free,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_bind_value,3_2_609660FA
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6090C1D6 sqlite3_clear_bindings,sqlite3_mutex_enter,sqlite3_mutex_leave,3_2_6090C1D6
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_60963143 sqlite3_stricmp,sqlite3_bind_int64,sqlite3_mutex_leave,3_2_60963143
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6096A2BD sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,3_2_6096A2BD
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6096923E sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_malloc,sqlite3_malloc,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_realloc,sqlite3_realloc,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_free,3_2_6096923E
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6096A38C sqlite3_bind_int,sqlite3_column_int,sqlite3_step,sqlite3_reset,3_2_6096A38C
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6096748C sqlite3_malloc,sqlite3_bind_int,sqlite3_step,sqlite3_column_blob,sqlite3_column_bytes,sqlite3_reset,sqlite3_bind_int,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_malloc,sqlite3_bind_int64,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_reset,memcmp,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_bind_int64,sqlite3_realloc,sqlite3_column_int,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_bind_int,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,3_2_6096748C
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_609254B1 sqlite3_bind_zeroblob,sqlite3_mutex_leave,3_2_609254B1
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6094B407 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,3_2_6094B407
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6090F435 sqlite3_bind_parameter_index,3_2_6090F435
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_609255D4 sqlite3_mutex_leave,sqlite3_bind_text16,3_2_609255D4
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_609255FF sqlite3_bind_text,3_2_609255FF
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6096A5EE sqlite3_value_text,sqlite3_value_bytes,sqlite3_strnicmp,sqlite3_strnicmp,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_malloc,sqlite3_column_int,sqlite3_column_int64,sqlite3_column_text,sqlite3_column_bytes,sqlite3_finalize,sqlite3_step,sqlite3_free,sqlite3_finalize,sqlite3_strnicmp,sqlite3_bind_int,sqlite3_column_int,sqlite3_step,sqlite3_reset,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_column_int64,sqlite3_column_int,sqlite3_column_text,sqlite3_column_bytes,sqlite3_step,sqlite3_finalize,sqlite3_strnicmp,sqlite3_strnicmp,sqlite3_bind_int,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_value_int,sqlite3_malloc,sqlite3_bind_null,sqlite3_step,sqlite3_reset,sqlite3_value_int,sqlite3_value_text,sqlite3_value_bytes,sqlite3_free,3_2_6096A5EE
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6094B54C sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,memmove,3_2_6094B54C
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_60925686 sqlite3_bind_int64,sqlite3_mutex_leave,3_2_60925686
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6094A6C5 sqlite3_bind_int64,sqlite3_step,sqlite3_column_blob,sqlite3_column_bytes,sqlite3_malloc,sqlite3_reset,sqlite3_free,3_2_6094A6C5
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_609256E5 sqlite3_bind_int,sqlite3_bind_int64,3_2_609256E5
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6094B6ED sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,3_2_6094B6ED
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6092562A sqlite3_bind_blob,3_2_6092562A
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_60925655 sqlite3_bind_null,sqlite3_mutex_leave,3_2_60925655
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6094C64A sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_free,3_2_6094C64A
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_609687A7 sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_column_blob,sqlite3_column_bytes,sqlite3_column_int64,sqlite3_reset,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,3_2_609687A7
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6095F7F7 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,3_2_6095F7F7
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6092570B sqlite3_bind_double,sqlite3_mutex_leave,3_2_6092570B
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6095F772 sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,3_2_6095F772
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_60925778 sqlite3_bind_value,sqlite3_bind_int64,sqlite3_bind_double,sqlite3_bind_blob,3_2_60925778
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6090577D sqlite3_bind_parameter_name,3_2_6090577D
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6094B764 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,3_2_6094B764
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6090576B sqlite3_bind_parameter_count,3_2_6090576B
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6094A894 sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,3_2_6094A894
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6095F883 sqlite3_bind_int64,sqlite3_bind_int,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,3_2_6095F883
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6094C8C2 sqlite3_value_int,sqlite3_value_int,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_null,sqlite3_bind_null,sqlite3_step,sqlite3_reset,3_2_6094C8C2
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6096281E sqlite3_mprintf,sqlite3_vtab_config,sqlite3_malloc,sqlite3_mprintf,sqlite3_mprintf,sqlite3_errmsg,sqlite3_mprintf,sqlite3_free,sqlite3_mprintf,sqlite3_exec,sqlite3_free,sqlite3_prepare_v2,sqlite3_bind_text,sqlite3_step,sqlite3_column_int64,sqlite3_finalize,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_errmsg,sqlite3_mprintf,sqlite3_mprintf,sqlite3_mprintf,sqlite3_free,sqlite3_mprintf,sqlite3_free,sqlite3_declare_vtab,sqlite3_errmsg,sqlite3_mprintf,sqlite3_free,3_2_6096281E
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6096583A memcmp,sqlite3_realloc,qsort,sqlite3_malloc,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_step,sqlite3_reset,3_2_6096583A
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6095F9AD sqlite3_bind_int,sqlite3_step,sqlite3_column_type,sqlite3_reset,3_2_6095F9AD
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6094A92B sqlite3_bind_int64,sqlite3_bind_null,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,3_2_6094A92B
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6090EAE5 sqlite3_transfer_bindings,3_2_6090EAE5
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6095FB98 sqlite3_value_int,sqlite3_bind_int,sqlite3_bind_value,sqlite3_step,sqlite3_reset,3_2_6095FB98
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6095ECA6 sqlite3_mprintf,sqlite3_mprintf,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_bind_value,3_2_6095ECA6
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6095FCCE sqlite3_malloc,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,3_2_6095FCCE
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6095FDAE sqlite3_malloc,sqlite3_bind_int,sqlite3_step,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_bind_int,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,sqlite3_free,3_2_6095FDAE
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_60966DF1 sqlite3_value_text,sqlite3_mprintf,sqlite3_free,strcmp,sqlite3_free,sqlite3_malloc,sqlite3_bind_int64,sqlite3_step,sqlite3_column_type,sqlite3_reset,sqlite3_column_blob,sqlite3_reset,sqlite3_malloc,sqlite3_free,sqlite3_reset,sqlite3_result_error_code,sqlite3_result_blob,3_2_60966DF1
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_60969D75 sqlite3_bind_int,sqlite3_step,sqlite3_column_int,sqlite3_reset,3_2_60969D75
                    Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exeCode function: 3_2_6095FFB2 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_result_error_code,3_2_6095FFB2
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                    Native API
                    1
                    DLL Side-Loading
                    1
                    Exploitation for Privilege Escalation
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    Input Capture
                    1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    2
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts2
                    Command and Scripting Interpreter
                    5
                    Windows Service
                    1
                    DLL Side-Loading
                    3
                    Obfuscated Files or Information
                    LSASS Memory1
                    Account Discovery
                    Remote Desktop Protocol1
                    Input Capture
                    21
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain Accounts2
                    Service Execution
                    1
                    Bootkit
                    1
                    Access Token Manipulation
                    21
                    Software Packing
                    Security Account Manager2
                    File and Directory Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook5
                    Windows Service
                    1
                    DLL Side-Loading
                    NTDS35
                    System Information Discovery
                    Distributed Component Object ModelInput Capture1
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
                    Process Injection
                    1
                    Masquerading
                    LSA Secrets41
                    Security Software Discovery
                    SSHKeylogging12
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials1
                    Process Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Access Token Manipulation
                    DCSync21
                    Virtualization/Sandbox Evasion
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
                    Process Injection
                    Proc Filesystem11
                    Application Window Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    Bootkit
                    /etc/passwd and /etc/shadow3
                    System Owner/User Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                    System Network Configuration Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    GEm3o8pION.exe34%ReversingLabsWin32.Trojan.Munp
                    SourceDetectionScannerLabelLink
                    C:\ProgramData\RSVideoJoiner\RSVideoJoiner.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe100%Joe Sandbox ML
                    C:\ProgramData\RSVideoJoiner\sqlite3.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\LTDIS13n.dll (copy)0%ReversingLabs
                    C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.dll (copy)0%ReversingLabs
                    C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\gdiplus.dll (copy)0%ReversingLabs
                    C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\is-45SUG.tmp0%ReversingLabs
                    C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\is-F8HGG.tmp0%ReversingLabs
                    C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\is-I2N1D.tmp0%ReversingLabs
                    C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\is-IA7V3.tmp0%ReversingLabs
                    C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\is-K12JE.tmp0%ReversingLabs
                    C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\is-LB3A8.tmp0%ReversingLabs
                    C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\is-O97I8.tmp0%ReversingLabs
                    C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\ltkrn13n.dll (copy)0%ReversingLabs
                    C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\msvcp71.dll (copy)0%ReversingLabs
                    C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\msvcr71.dll (copy)0%ReversingLabs
                    C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\sqlite3.dll (copy)0%ReversingLabs
                    C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\uninstall\is-QRTQ3.tmp3%ReversingLabs
                    C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\uninstall\unins000.exe (copy)3%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\is-7V0SN.tmp\_isetup\_iscrypt.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\is-7V0SN.tmp\_isetup\_setup64.tmp0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\is-7V0SN.tmp\_isetup\_shfoldr.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp3%ReversingLabs
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://188.119.66.185/ai/?key=8f3f2b3ae100%Avira URL Cloudmalware
                    https://188.119.66.185/R0%Avira URL Cloudsafe
                    http://wonderwork.ucoz.com/0%Avira URL Cloudsafe
                    https://188.119.66.185/405117-2476756634-10030%Avira URL Cloudsafe
                    https://188.119.66.185/ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4100%Avira URL Cloudmalware
                    https://188.119.66.185/ography0%Avira URL Cloudsafe
                    https://188.119.66.185/mCertificates0%Avira URL Cloudsafe
                    https://188.119.66.185/ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e100%Avira URL Cloudmalware
                    https://188.119.66.185/ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b82a8dcd6c946851e300888b3250aa15d005633775b0e650f3ba1e9c95b1c92975ccf55bc592fe5a818ece02a1b7e2984c57cad7021dda30201bd2318f100%Avira URL Cloudmalware
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    https://188.119.66.185/ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b82a8dcd6c946851e300888b3250aa15d005633775b0e650f3ba1e9c95b1c92975ccf55bc592fe5a818ece02a1b7e2984c57cad7021dda30201bd2318ffalse
                    • Avira URL Cloud: malware
                    unknown
                    https://188.119.66.185/ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955efalse
                    • Avira URL Cloud: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.innosetup.com/GEm3o8pION.tmp, GEm3o8pION.tmp, 00000001.00000000.2037814779.0000000000401000.00000020.00000001.01000000.00000004.sdmp, GEm3o8pION.tmp.0.dr, is-QRTQ3.tmp.1.drfalse
                      high
                      https://188.119.66.185/Renvideojoiner2.exe, 00000003.00000002.3289823562.00000000009BF000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://188.119.66.185/ai/?key=8f3f2b3aeenvideojoiner2.exe, 00000003.00000002.3289823562.00000000009B1000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://www.remobjects.com/psUGEm3o8pION.exe, 00000000.00000003.2037337872.0000000002188000.00000004.00001000.00020000.00000000.sdmp, GEm3o8pION.exe, 00000000.00000003.2037125510.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, GEm3o8pION.tmp, 00000001.00000000.2037814779.0000000000401000.00000020.00000001.01000000.00000004.sdmp, GEm3o8pION.tmp.0.dr, is-QRTQ3.tmp.1.drfalse
                        high
                        https://188.119.66.185/priseCertificatesenvideojoiner2.exe, 00000003.00000002.3289823562.00000000009D2000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://188.119.66.185/ographyenvideojoiner2.exe, 00000003.00000002.3289823562.00000000009D2000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://188.119.66.185/mCertificatesenvideojoiner2.exe, 00000003.00000002.3289823562.00000000009D2000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://188.119.66.185/ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4envideojoiner2.exe, 00000003.00000002.3291386968.000000000335E000.00000004.00000020.00020000.00000000.sdmp, envideojoiner2.exe, 00000003.00000002.3289823562.00000000009D2000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUGEm3o8pION.exefalse
                            high
                            https://188.119.66.185/rosoftenvideojoiner2.exe, 00000003.00000002.3289823562.00000000009D2000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://188.119.66.185/envideojoiner2.exe, 00000003.00000002.3289823562.00000000009D2000.00000004.00000020.00020000.00000000.sdmp, envideojoiner2.exe, 00000003.00000002.3289823562.00000000009BF000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://188.119.66.185/en-GBenvideojoiner2.exe, 00000003.00000002.3289823562.00000000009D2000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineGEm3o8pION.exefalse
                                    high
                                    http://wonderwork.ucoz.com/GEm3o8pION.tmp, 00000001.00000002.3291322769.0000000005EDF000.00000004.00001000.00020000.00000000.sdmp, envideojoiner2.exe, 00000003.00000000.2054007794.00000000004D5000.00000002.00000001.01000000.00000009.sdmp, RSVideoJoiner.exe.3.dr, envideojoiner2.exe.1.dr, is-SG5N6.tmp.1.drfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://188.119.66.185/405117-2476756634-1003envideojoiner2.exe, 00000003.00000002.3289823562.00000000009D2000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.remobjects.com/psGEm3o8pION.exe, 00000000.00000003.2037337872.0000000002188000.00000004.00001000.00020000.00000000.sdmp, GEm3o8pION.exe, 00000000.00000003.2037125510.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, GEm3o8pION.tmp, GEm3o8pION.tmp, 00000001.00000000.2037814779.0000000000401000.00000020.00000001.01000000.00000004.sdmp, GEm3o8pION.tmp.0.dr, is-QRTQ3.tmp.1.drfalse
                                      high
                                      https://www.easycutstudio.com/support.htmlGEm3o8pION.exe, 00000000.00000003.2036233020.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, GEm3o8pION.exe, 00000000.00000003.2036354509.0000000002181000.00000004.00001000.00020000.00000000.sdmp, GEm3o8pION.exe, 00000000.00000002.3289847970.0000000002181000.00000004.00001000.00020000.00000000.sdmp, GEm3o8pION.tmp, 00000001.00000003.2039779041.0000000002268000.00000004.00001000.00020000.00000000.sdmp, GEm3o8pION.tmp, 00000001.00000003.2039601389.0000000003230000.00000004.00001000.00020000.00000000.sdmp, GEm3o8pION.tmp, 00000001.00000002.3290434003.0000000002268000.00000004.00001000.00020000.00000000.sdmp, GEm3o8pION.tmp, 00000001.00000002.3289865233.0000000000629000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://188.119.66.185/ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b82a8dcd6c946851e300888b325envideojoiner2.exe, 00000003.00000002.3289823562.00000000009D2000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          31.214.157.206
                                          unknownGermany
                                          58329RACKPLACEDEfalse
                                          188.119.66.185
                                          unknownRussian Federation
                                          209499FLYNETRUfalse
                                          Joe Sandbox version:41.0.0 Charoite
                                          Analysis ID:1575799
                                          Start date and time:2024-12-16 10:40:01 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 6m 21s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:6
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:GEm3o8pION.exe
                                          renamed because original name is a hash value
                                          Original Sample Name:ab8f43d7eb7fe08723fe289589fca3d8.exe
                                          Detection:MAL
                                          Classification:mal92.troj.evad.winEXE@5/30@0/2
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HCA Information:
                                          • Successful, ratio: 92%
                                          • Number of executed functions: 196
                                          • Number of non-executed functions: 269
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                          • Excluded IPs from analysis (whitelisted): 13.107.246.63, 20.109.210.53
                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • VT rate limit hit for: GEm3o8pION.exe
                                          TimeTypeDescription
                                          04:41:27API Interceptor466614x Sleep call for process: envideojoiner2.exe modified
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          31.214.157.206bzX2pV3Ybw.exeGet hashmaliciousSocks5SystemzBrowse
                                            Ni2ghr9eUJ.exeGet hashmaliciousSocks5SystemzBrowse
                                              Ni2ghr9eUJ.exeGet hashmaliciousSocks5SystemzBrowse
                                                2mtt3zE6Vh.exeGet hashmaliciousSocks5SystemzBrowse
                                                  7i6bUvYZ4L.exeGet hashmaliciousSocks5SystemzBrowse
                                                    file.exeGet hashmaliciousSocks5SystemzBrowse
                                                      imMQqf6YWk.exeGet hashmaliciousSocks5SystemzBrowse
                                                        imMQqf6YWk.exeGet hashmaliciousSocks5SystemzBrowse
                                                          file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                                            file.exeGet hashmaliciousSocks5SystemzBrowse
                                                              188.119.66.185bzX2pV3Ybw.exeGet hashmaliciousSocks5SystemzBrowse
                                                                bzX2pV3Ybw.exeGet hashmaliciousSocks5SystemzBrowse
                                                                  Ni2ghr9eUJ.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    Ni2ghr9eUJ.exeGet hashmaliciousSocks5SystemzBrowse
                                                                      2mtt3zE6Vh.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        2mtt3zE6Vh.exeGet hashmaliciousSocks5SystemzBrowse
                                                                          7i6bUvYZ4L.exeGet hashmaliciousSocks5SystemzBrowse
                                                                            file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                              imMQqf6YWk.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                imMQqf6YWk.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  No context
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  RACKPLACEDEbzX2pV3Ybw.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 31.214.157.206
                                                                                  Ni2ghr9eUJ.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 31.214.157.206
                                                                                  Ni2ghr9eUJ.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 31.214.157.206
                                                                                  2mtt3zE6Vh.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 31.214.157.206
                                                                                  7i6bUvYZ4L.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 31.214.157.206
                                                                                  file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 31.214.157.206
                                                                                  imMQqf6YWk.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 31.214.157.206
                                                                                  imMQqf6YWk.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 31.214.157.206
                                                                                  file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                                                                  • 31.214.157.206
                                                                                  file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 31.214.157.206
                                                                                  FLYNETRUbzX2pV3Ybw.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 188.119.66.185
                                                                                  bzX2pV3Ybw.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 188.119.66.185
                                                                                  Ni2ghr9eUJ.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 188.119.66.185
                                                                                  Ni2ghr9eUJ.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 188.119.66.185
                                                                                  2mtt3zE6Vh.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 188.119.66.185
                                                                                  2mtt3zE6Vh.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 188.119.66.185
                                                                                  7i6bUvYZ4L.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 188.119.66.185
                                                                                  file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 188.119.66.185
                                                                                  imMQqf6YWk.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 188.119.66.185
                                                                                  imMQqf6YWk.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 188.119.66.185
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  51c64c77e60f3980eea90869b68c58a8bzX2pV3Ybw.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 188.119.66.185
                                                                                  bzX2pV3Ybw.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 188.119.66.185
                                                                                  Ni2ghr9eUJ.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 188.119.66.185
                                                                                  Ni2ghr9eUJ.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 188.119.66.185
                                                                                  2mtt3zE6Vh.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 188.119.66.185
                                                                                  2mtt3zE6Vh.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 188.119.66.185
                                                                                  7i6bUvYZ4L.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 188.119.66.185
                                                                                  file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 188.119.66.185
                                                                                  imMQqf6YWk.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 188.119.66.185
                                                                                  imMQqf6YWk.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  • 188.119.66.185
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  C:\ProgramData\RSVideoJoiner\sqlite3.dllbzX2pV3Ybw.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                    bzX2pV3Ybw.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                      Ni2ghr9eUJ.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                        Ni2ghr9eUJ.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                          2mtt3zE6Vh.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                            2mtt3zE6Vh.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                              7i6bUvYZ4L.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                  imMQqf6YWk.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                    imMQqf6YWk.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                      Process:C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):3145160
                                                                                                      Entropy (8bit):6.482091546434951
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:49152:SJ+65hIkF2vXMk1oXkg/Sx+u/2QmrDE82AUXj3SV:p65hIkFuXMioXkg8+22QmrDE82AUXj3o
                                                                                                      MD5:563B61FE1BF69C7FA387A085C07ABB31
                                                                                                      SHA1:9E2B97354FC985F27CC16EDE669839E308618C23
                                                                                                      SHA-256:B820CCA708836CF9C180A60C06E57DE1939777B544910A346232BEE2C8521CCC
                                                                                                      SHA-512:26457237617A8D6F38FAD2DF2EC3712FCA5BA53A0EFD0A11C9CA6C0FE554203DA8E9DF1EA4383A6B765C931E9D5F6BCEE0B9D9E422E1279CF2357483001A6819
                                                                                                      Malicious:true
                                                                                                      Yara Hits:
                                                                                                      • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\ProgramData\RSVideoJoiner\RSVideoJoiner.exe, Author: Joe Security
                                                                                                      Antivirus:
                                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                      Reputation:low
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L.....^g.............................T............@..........................`0......Y0.....................................D........P..................................................................................p..........................._aett_8............................. ..`_aftt_8.j........0..................@..@_agtt_8..d.......0..................@....rsrc........P......................@..@_ahtt_8......p......................`.-.........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):645592
                                                                                                      Entropy (8bit):6.50414583238337
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:12288:i0zrcH2F3OfwjtWvuFEmhx0Cj37670jwX+E7tFKm0qTYh:iJUOfwh8u9hx0D70NE7tFTYh
                                                                                                      MD5:E477A96C8F2B18D6B5C27BDE49C990BF
                                                                                                      SHA1:E980C9BF41330D1E5BD04556DB4646A0210F7409
                                                                                                      SHA-256:16574F51785B0E2FC29C2C61477EB47BB39F714829999511DC8952B43AB17660
                                                                                                      SHA-512:335A86268E7C0E568B1C30981EC644E6CD332E66F96D2551B58A82515316693C1859D87B4F4B7310CF1AC386CEE671580FDD999C3BCB23ACF2C2282C01C8798C
                                                                                                      Malicious:true
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                      Joe Sandbox View:
                                                                                                      • Filename: bzX2pV3Ybw.exe, Detection: malicious, Browse
                                                                                                      • Filename: bzX2pV3Ybw.exe, Detection: malicious, Browse
                                                                                                      • Filename: Ni2ghr9eUJ.exe, Detection: malicious, Browse
                                                                                                      • Filename: Ni2ghr9eUJ.exe, Detection: malicious, Browse
                                                                                                      • Filename: 2mtt3zE6Vh.exe, Detection: malicious, Browse
                                                                                                      • Filename: 2mtt3zE6Vh.exe, Detection: malicious, Browse
                                                                                                      • Filename: 7i6bUvYZ4L.exe, Detection: malicious, Browse
                                                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                                                      • Filename: imMQqf6YWk.exe, Detection: malicious, Browse
                                                                                                      • Filename: imMQqf6YWk.exe, Detection: malicious, Browse
                                                                                                      Reputation:high, very likely benign file
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=S.v..?......!................X..............`......................... ......8......... .................................L................................'......................................................p............................text...............................`.0`.data...............................@.@..rdata..$...........................@.@@.bss..................................@..edata..............................@.0@.idata..L...........................@.0..CRT................................@.0..tls.... ...........................@.0..reloc...'.......(..................@.0B/4......`....0......................@.@B/19..........@......................@..B/35.....M....P......................@..B/51.....`C...`...D..................@..B/63..................8..............@..B/77..................F..............@..B/89..................R..
                                                                                                      Process:C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      File Type:ISO-8859 text, with no line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):8
                                                                                                      Entropy (8bit):2.0
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3:5Ll/n:7n
                                                                                                      MD5:C15ADED9747691FA81C39780DB43C308
                                                                                                      SHA1:7B2694C8692D6AEC6A5E54C8D9AB749D9DCD2DFB
                                                                                                      SHA-256:00EF6195695C7459F858CC612440B277E22D0987F2F63E18C51C5DD90D0949C8
                                                                                                      SHA-512:ED7315165F3CBE7FCAB5AAAB74DBFCB7C301966273112858F66EAF57E19E7BEAF12D09385AFE70D00DE8C2C30CC25715CA27338736C4742FA8203820EA1CC1E6
                                                                                                      Malicious:false
                                                                                                      Reputation:low
                                                                                                      Preview:.._g....
                                                                                                      Process:C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):4
                                                                                                      Entropy (8bit):0.8112781244591328
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3:Xln:1
                                                                                                      MD5:ED69DFADEF68FC181AAE2D22715A01D6
                                                                                                      SHA1:3A9981C3761721792B7702231583758AE5ACF8A7
                                                                                                      SHA-256:3EF3BD3D6658C0DFDFDD7AA65E3D92BF1DA9A04678A4ED2A5D84ED824EC91775
                                                                                                      SHA-512:B70AF13C96AC7C3AC97C84F9EFC1F38794B190635AB602CE35C8572B9C3597DD1A4ABBFFCCB3AD8AE76CDB247C221168F2D45B7225A56444FF445937921FC318
                                                                                                      Malicious:false
                                                                                                      Reputation:low
                                                                                                      Preview:....
                                                                                                      Process:C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      File Type:ASCII text, with no line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):128
                                                                                                      Entropy (8bit):2.9012093522336393
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3:ObXXXd0AbDBdUBWetxt:Or9Lb3UFx
                                                                                                      MD5:679DD163372163CD8FFC24E3C9E758B3
                                                                                                      SHA1:F307C14CA65810C8D0238B89B49B2ACD7C5B233B
                                                                                                      SHA-256:510EA89D00FA427C33BD67AEEA60D21066976F085959C2AFE1F69411A8CA722D
                                                                                                      SHA-512:46C464F15BCE39E28DCD48AF36C424845631D2B48D7E37D7FBBBEE0BC4DF32445A2810E397BF29FCA76C0364B1AA30CC05DCF4D9E799C6C697B49A174560969C
                                                                                                      Malicious:false
                                                                                                      Reputation:moderate, very likely benign file
                                                                                                      Preview:12b48997735ce8b4537cf99be74bb62f518d3799011c89eb7c719048e83fac56................................................................
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp
                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):265728
                                                                                                      Entropy (8bit):6.4472652154517345
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:6144:Fs7u3JL96d15Y2BmKh678IuYAhN3YCjlgiZioXyLWvCe93rZ5WZOlUmpNJ5mlbb/:e7WJL96d15Y2BmKh678IuYAhN3YCjlgw
                                                                                                      MD5:752CA72DE243F44AF2ED3FF023EF826E
                                                                                                      SHA1:7B508F6B72BD270A861B368EC9FE4BF55D8D472F
                                                                                                      SHA-256:F8196F03F8CBED87A92BA5C1207A9063D4EEBB0C22CA88A279F1AE1B1F1B8196
                                                                                                      SHA-512:4E5A7242C25D4BBF9087F813D4BF057432271A0F08580DA8C894B7C290DE9E0CF640F6F616B0B6C6CAD14DC0AFDD2697D2855BA4070270824540BAE835FE8C4A
                                                                                                      Malicious:true
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?..=...........!................`;.......................................P.......................'..............p...o.......d.... .......................0..\.......................................................4............................text...k........................... ..`.rdata..............................@..@.data....9.......0..................@....idata..............................@....rsrc........ ......................@..@.reloc..T....0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp
                                                                                                      File Type:MS Windows HtmlHelp Data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):78183
                                                                                                      Entropy (8bit):7.692742945771669
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:1536:Bkt2SjEQ3r94YqwyadpL1X6Dtn4afF1VowWb8ZmmUQNk3gNqCLbMsFxJse8hbpmn:mR/CYj9dp5XIyI2b/mY3gNjLbMsOaP
                                                                                                      MD5:B1B9E6D43319F6D4E52ED858C5726A97
                                                                                                      SHA1:5033047A30CCCF57783C600FD76A6D220021B19D
                                                                                                      SHA-256:8003A4A0F9F5DFB62BEFBF81F8C05894B0C1F987ACFC8654A6C6CE02B6213910
                                                                                                      SHA-512:E56D6EC9170DEBAC28BB514942F794F73D4C194D04C54EFF9227B6EE3C74BA4FCF239FFF0BB6556DC8B847FA89D382AF206A2C481C41A3510936B0A74192D2C2
                                                                                                      Malicious:false
                                                                                                      Preview:ITSF....`..........E.......|.{.......".....|.{......."..`...............x.......T.......................g1..............ITSP....T...........................................j..].!......."..T...............PMGLW................/..../#IDXHDR...F.../#ITBITS..../#IVB...N$./#STRINGS.....P./#SYSTEM..N.'./#TOPICS...F.0./#URLSTR...:.t./#URLTBL...v.D./$FIftiMain......1./$OBJINST...z.../$WWAssociativeLinks/..../$WWAssociativeLinks/Property...v../$WWKeywordLinks/..../$WWKeywordLinks/Property...r../After.jpg...4..../Auto-.hhc...^./Auto-Adjustment.htm....?./Auto-BleachTeeth.htm...z.3./Auto-Crop2Plus.htm..U.j./Auto-Emphasis.htm...w.V./Auto-EyeColor.htm...!.../Auto-EyePencil.htm..._.../Auto-EyeShadow.htm...,.3./Auto-GettingStarted.htm....Q./Auto-Lipstick.htm..R.M./Auto-Liquify.htm...-.v./Auto-Menu.htm..S.r./Auto-OrderingInformation.htm...Q.../Auto-Overview.htm..^.$./Auto-Powder.htm......./Auto-Resize.htm..s.b./Auto-Rotation.htm..?.e./Auto-Rouge.htm...=.d./Auto-SkinCare.htm...|.{./Auto-SmartPatchCosmet
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp
                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):176128
                                                                                                      Entropy (8bit):6.204917493416147
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3072:l9iEoC1+7N9UQV2Mi8NTUU3/EO3h3E9y6GeoPRtsoWhi75MUbvSHQ:l+ssU62Mi8x9P/UVGeQRthMUbvS
                                                                                                      MD5:FEC4FF0C2967A05543747E8D552CF9DF
                                                                                                      SHA1:B4449DC0DF8C0AFCC9F32776384A6F5B5CEDE20C
                                                                                                      SHA-256:5374148EBCF4B456F8711516A58C9A007A393CA88F3D9759041F691E4343C7D6
                                                                                                      SHA-512:93E3F48CD393314178CBC86F6142D577D5EAAE52B47C4D947DBA4DFB706860B150FF5B0E546CB83114CA44666E9DF6021964D79D064B775A58698DAA9550EF13
                                                                                                      Malicious:true
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+0.J^..J^..J^.cE...J^..VR..J^..UU..J^.#VP..J^..UT..J^..UZ..J^..kU..J^..kZ..J^..J_..J^..iT..J^..io..J^.gLX..J^._jZ..J^.Rich.J^.................PE..L.....L...........!.....0...@.......'.......@...................................................................... e..k....X..d....`.......................p..p....................................................@...............................text....".......0.................. ..`.rdata...%...@...0...@..............@..@.data...T....p... ...p..............@....rsrc........`......................@..@.reloc.......p......................@..B........................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp
                                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                      Category:modified
                                                                                                      Size (bytes):3145160
                                                                                                      Entropy (8bit):6.482091546434951
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:49152:SJ+65hIkF2vXMk1oXkg/Sx+u/2QmrDE82AUXj3SV:p65hIkFuXMioXkg8+22QmrDE82AUXj3o
                                                                                                      MD5:563B61FE1BF69C7FA387A085C07ABB31
                                                                                                      SHA1:9E2B97354FC985F27CC16EDE669839E308618C23
                                                                                                      SHA-256:B820CCA708836CF9C180A60C06E57DE1939777B544910A346232BEE2C8521CCC
                                                                                                      SHA-512:26457237617A8D6F38FAD2DF2EC3712FCA5BA53A0EFD0A11C9CA6C0FE554203DA8E9DF1EA4383A6B765C931E9D5F6BCEE0B9D9E422E1279CF2357483001A6819
                                                                                                      Malicious:true
                                                                                                      Yara Hits:
                                                                                                      • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe, Author: Joe Security
                                                                                                      Antivirus:
                                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L.....^g.............................T............@..........................`0......Y0.....................................D........P..................................................................................p..........................._aett_8............................. ..`_aftt_8.j........0..................@..@_agtt_8..d.......0..................@....rsrc........P......................@..@_ahtt_8......p......................`.-.........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp
                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):1645320
                                                                                                      Entropy (8bit):6.787752063353702
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:24576:Fk18V2mHkfIE3Ip9vkWEgDecZV3W9kpOuRw8RhWd5Ixwzr6lOboU7j97S9D+z98v:FZNkf+uW3D1ZVG9kVw8I5Rv6lwH9+X
                                                                                                      MD5:871C903A90C45CA08A9D42803916C3F7
                                                                                                      SHA1:D962A12BC15BFB4C505BB63F603CA211588958DB
                                                                                                      SHA-256:F1DA32183B3DA19F75FA4EF0974A64895266B16D119BBB1DA9FE63867DBA0645
                                                                                                      SHA-512:985B0B8B5E3D96ACFD0514676D9F0C5D2D8F11E31F01ACFA0F7DA9AF3568E12343CA77F541F55EDDA6A0E5C14FE733BDA5DC1C10BB170D40D15B7A60AD000145
                                                                                                      Malicious:false
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......s...7o..7o..7o...L..<o..7o..en...L..$o...L...o...L..6o...L..6o...L..(n...L..6o..Rich7o..................PE..L.....D@...........!.........`.......Q.......`.....p................................................................l...CN..|...x....p...........................s.....8...............................................0............................text...n........................... ..`.data...X...........................@...Shared.......`.......P..............@....rsrc........p... ...`..............@..@.reloc...s..........................@..B................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp
                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):645592
                                                                                                      Entropy (8bit):6.50414583238337
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:12288:i0zrcH2F3OfwjtWvuFEmhx0Cj37670jwX+E7tFKm0qTYh:iJUOfwh8u9hx0D70NE7tFTYh
                                                                                                      MD5:E477A96C8F2B18D6B5C27BDE49C990BF
                                                                                                      SHA1:E980C9BF41330D1E5BD04556DB4646A0210F7409
                                                                                                      SHA-256:16574F51785B0E2FC29C2C61477EB47BB39F714829999511DC8952B43AB17660
                                                                                                      SHA-512:335A86268E7C0E568B1C30981EC644E6CD332E66F96D2551B58A82515316693C1859D87B4F4B7310CF1AC386CEE671580FDD999C3BCB23ACF2C2282C01C8798C
                                                                                                      Malicious:true
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=S.v..?......!................X..............`......................... ......8......... .................................L................................'......................................................p............................text...............................`.0`.data...............................@.@..rdata..$...........................@.@@.bss..................................@..edata..............................@.0@.idata..L...........................@.0..CRT................................@.0..tls.... ...........................@.0..reloc...'.......(..................@.0B/4......`....0......................@.@B/19..........@......................@..B/35.....M....P......................@..B/51.....`C...`...D..................@..B/63..................8..............@..B/77..................F..............@..B/89..................R..
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp
                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):176128
                                                                                                      Entropy (8bit):6.204917493416147
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3072:l9iEoC1+7N9UQV2Mi8NTUU3/EO3h3E9y6GeoPRtsoWhi75MUbvSHQ:l+ssU62Mi8x9P/UVGeQRthMUbvS
                                                                                                      MD5:FEC4FF0C2967A05543747E8D552CF9DF
                                                                                                      SHA1:B4449DC0DF8C0AFCC9F32776384A6F5B5CEDE20C
                                                                                                      SHA-256:5374148EBCF4B456F8711516A58C9A007A393CA88F3D9759041F691E4343C7D6
                                                                                                      SHA-512:93E3F48CD393314178CBC86F6142D577D5EAAE52B47C4D947DBA4DFB706860B150FF5B0E546CB83114CA44666E9DF6021964D79D064B775A58698DAA9550EF13
                                                                                                      Malicious:true
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+0.J^..J^..J^.cE...J^..VR..J^..UU..J^.#VP..J^..UT..J^..UZ..J^..kU..J^..kZ..J^..J_..J^..iT..J^..io..J^.gLX..J^._jZ..J^.Rich.J^.................PE..L.....L...........!.....0...@.......'.......@...................................................................... e..k....X..d....`.......................p..p....................................................@...............................text....".......0.................. ..`.rdata...%...@...0...@..............@..@.data...T....p... ...p..............@....rsrc........`......................@..@.reloc.......p......................@..B........................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp
                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):1645320
                                                                                                      Entropy (8bit):6.787752063353702
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:24576:Fk18V2mHkfIE3Ip9vkWEgDecZV3W9kpOuRw8RhWd5Ixwzr6lOboU7j97S9D+z98v:FZNkf+uW3D1ZVG9kVw8I5Rv6lwH9+X
                                                                                                      MD5:871C903A90C45CA08A9D42803916C3F7
                                                                                                      SHA1:D962A12BC15BFB4C505BB63F603CA211588958DB
                                                                                                      SHA-256:F1DA32183B3DA19F75FA4EF0974A64895266B16D119BBB1DA9FE63867DBA0645
                                                                                                      SHA-512:985B0B8B5E3D96ACFD0514676D9F0C5D2D8F11E31F01ACFA0F7DA9AF3568E12343CA77F541F55EDDA6A0E5C14FE733BDA5DC1C10BB170D40D15B7A60AD000145
                                                                                                      Malicious:false
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......s...7o..7o..7o...L..<o..7o..en...L..$o...L...o...L..6o...L..6o...L..(n...L..6o..Rich7o..................PE..L.....D@...........!.........`.......Q.......`.....p................................................................l...CN..|...x....p...........................s.....8...............................................0............................text...n........................... ..`.data...X...........................@...Shared.......`.......P..............@....rsrc........p... ...`..............@..@.reloc...s..........................@..B................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp
                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):499712
                                                                                                      Entropy (8bit):6.414789978441117
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:12288:fJzxYPVsBnxO/R7krZhUgiW6QR7t5k3Ooc8iHkC2eq:fZxvBnxOJ7ki3Ooc8iHkC2e
                                                                                                      MD5:561FA2ABB31DFA8FAB762145F81667C2
                                                                                                      SHA1:C8CCB04EEDAC821A13FAE314A2435192860C72B8
                                                                                                      SHA-256:DF96156F6A548FD6FE5672918DE5AE4509D3C810A57BFFD2A91DE45A3ED5B23B
                                                                                                      SHA-512:7D960AA8E3CCE22D63A6723D7F00C195DE7DE83B877ECA126E339E2D8CC9859E813E05C5C0A5671A75BB717243E9295FD13E5E17D8C6660EB59F5BAEE63A7C43
                                                                                                      Malicious:false
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................................................................Rich...................PE..L.....w>...........!.................-............:|................................~e..............................$...?...d!..<....`.......................p...0..8...8...............................H............................................text............................... ..`.rdata..2*.......0..................@..@.data...h!...0... ...0..............@....rsrc........`.......P..............@..@.reloc...0...p...@...`..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp
                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):348160
                                                                                                      Entropy (8bit):6.542655141037356
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:6144:OcV9z83OtqxnEYmt3NEnvfF+Tbmbw6An8FMciFMNrb3YgxxpbCAOxO2ElvlE:Ooz83OtIEzW+/m/AyF7bCrO/E
                                                                                                      MD5:86F1895AE8C5E8B17D99ECE768A70732
                                                                                                      SHA1:D5502A1D00787D68F548DDEEBBDE1ECA5E2B38CA
                                                                                                      SHA-256:8094AF5EE310714CAEBCCAEEE7769FFB08048503BA478B879EDFEF5F1A24FEFE
                                                                                                      SHA-512:3B7CE2B67056B6E005472B73447D2226677A8CADAE70428873F7EFA5ED11A3B3DBF6B1A42C5B05B1F2B1D8E06FF50DFC6532F043AF8452ED87687EEFBF1791DA
                                                                                                      Malicious:false
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2..S..S..S..Tp..S..S..5S..BX..S..BX...S..BX..Q..BX..S..BX..S..BX..S..Rich.S..........................PE..L.....V>...........!................."............4|.........................`......................................t....C......(.... .......................0..d+..H...8...........................x...H...............l............................text............................... ..`.rdata..@...........................@..@.data... h.......`..................@....rsrc........ ......................@..@.reloc..d+...0...0... ..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp
                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):265728
                                                                                                      Entropy (8bit):6.4472652154517345
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:6144:Fs7u3JL96d15Y2BmKh678IuYAhN3YCjlgiZioXyLWvCe93rZ5WZOlUmpNJ5mlbb/:e7WJL96d15Y2BmKh678IuYAhN3YCjlgw
                                                                                                      MD5:752CA72DE243F44AF2ED3FF023EF826E
                                                                                                      SHA1:7B508F6B72BD270A861B368EC9FE4BF55D8D472F
                                                                                                      SHA-256:F8196F03F8CBED87A92BA5C1207A9063D4EEBB0C22CA88A279F1AE1B1F1B8196
                                                                                                      SHA-512:4E5A7242C25D4BBF9087F813D4BF057432271A0F08580DA8C894B7C290DE9E0CF640F6F616B0B6C6CAD14DC0AFDD2697D2855BA4070270824540BAE835FE8C4A
                                                                                                      Malicious:true
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?..=...........!................`;.......................................P.......................'..............p...o.......d.... .......................0..\.......................................................4............................text...k........................... ..`.rdata..............................@..@.data....9.......0..................@....idata..............................@....rsrc........ ......................@..@.reloc..T....0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp
                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):445440
                                                                                                      Entropy (8bit):6.439135831549689
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:12288:sosmML3+OytpWFkCU1wayvT33iiDNmAE27R9sY9kP0O+:soslvJ3RaY9wU
                                                                                                      MD5:CAC7E17311797C5471733638C0DC1F01
                                                                                                      SHA1:58E0BD1B63525A2955439CB9BE3431CEA7FF1121
                                                                                                      SHA-256:19248357ED7CFF72DEAD18B5743BF66C61438D68374BDA59E3B9D444C6F8F505
                                                                                                      SHA-512:A677319AC8A2096D95FFC69F22810BD4F083F6BF55B8A77F20D8FB8EE01F2FEE619CE318D1F55C392A8F3A4D635D9285712E2C572E62997014641C36EDC060A2
                                                                                                      Malicious:true
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...*..=...........!.........\......@!....................................... .......................'..........................P.......H.......................l....................................................................................text............................... ..`.rdata..2$.......&..................@..@.data...............................@....idata..............................@....rsrc...H...........................@..@.reloc...&.......(..................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp
                                                                                                      File Type:MS Windows HtmlHelp Data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):78183
                                                                                                      Entropy (8bit):7.692742945771669
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:1536:Bkt2SjEQ3r94YqwyadpL1X6Dtn4afF1VowWb8ZmmUQNk3gNqCLbMsFxJse8hbpmn:mR/CYj9dp5XIyI2b/mY3gNjLbMsOaP
                                                                                                      MD5:B1B9E6D43319F6D4E52ED858C5726A97
                                                                                                      SHA1:5033047A30CCCF57783C600FD76A6D220021B19D
                                                                                                      SHA-256:8003A4A0F9F5DFB62BEFBF81F8C05894B0C1F987ACFC8654A6C6CE02B6213910
                                                                                                      SHA-512:E56D6EC9170DEBAC28BB514942F794F73D4C194D04C54EFF9227B6EE3C74BA4FCF239FFF0BB6556DC8B847FA89D382AF206A2C481C41A3510936B0A74192D2C2
                                                                                                      Malicious:false
                                                                                                      Preview:ITSF....`..........E.......|.{.......".....|.{......."..`...............x.......T.......................g1..............ITSP....T...........................................j..].!......."..T...............PMGLW................/..../#IDXHDR...F.../#ITBITS..../#IVB...N$./#STRINGS.....P./#SYSTEM..N.'./#TOPICS...F.0./#URLSTR...:.t./#URLTBL...v.D./$FIftiMain......1./$OBJINST...z.../$WWAssociativeLinks/..../$WWAssociativeLinks/Property...v../$WWKeywordLinks/..../$WWKeywordLinks/Property...r../After.jpg...4..../Auto-.hhc...^./Auto-Adjustment.htm....?./Auto-BleachTeeth.htm...z.3./Auto-Crop2Plus.htm..U.j./Auto-Emphasis.htm...w.V./Auto-EyeColor.htm...!.../Auto-EyePencil.htm..._.../Auto-EyeShadow.htm...,.3./Auto-GettingStarted.htm....Q./Auto-Lipstick.htm..R.M./Auto-Liquify.htm...-.v./Auto-Menu.htm..S.r./Auto-OrderingInformation.htm...Q.../Auto-Overview.htm..^.$./Auto-Powder.htm......./Auto-Resize.htm..s.b./Auto-Rotation.htm..?.e./Auto-Rouge.htm...=.d./Auto-SkinCare.htm...|.{./Auto-SmartPatchCosmet
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):3145160
                                                                                                      Entropy (8bit):6.482091124472161
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:49152:PJ+65hIkF2vXMk1oXkg/Sx+u/2QmrDE82AUXj3SV:065hIkFuXMioXkg8+22QmrDE82AUXj3o
                                                                                                      MD5:903D1F19220989A932DD1909F1CB09E4
                                                                                                      SHA1:EE90EAA8AD47E77075A775D0B11DAFEA0A74A37D
                                                                                                      SHA-256:26A3BD50C3ECE87656194CDBF8228AD8B936A90E9018252099EBCEAF5BC916E6
                                                                                                      SHA-512:6C32EBCFB78CA95DA008650235C17DFCA123928DCFE4C9A847B3801B5BBB602B917CA7BC3D191B9BBBC4F5EAC73AD5C733184AFBFE08E5099B2426BDB0CBC579
                                                                                                      Malicious:false
                                                                                                      Yara Hits:
                                                                                                      • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\is-SG5N6.tmp, Author: Joe Security
                                                                                                      Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L.....^g.............................T............@..........................`0......Y0.....................................D........P..................................................................................p..........................._aett_8............................. ..`_aftt_8.j........0..................@..@_agtt_8..d.......0..................@....rsrc........P......................@..@_ahtt_8......p......................`.-.........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp
                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):445440
                                                                                                      Entropy (8bit):6.439135831549689
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:12288:sosmML3+OytpWFkCU1wayvT33iiDNmAE27R9sY9kP0O+:soslvJ3RaY9wU
                                                                                                      MD5:CAC7E17311797C5471733638C0DC1F01
                                                                                                      SHA1:58E0BD1B63525A2955439CB9BE3431CEA7FF1121
                                                                                                      SHA-256:19248357ED7CFF72DEAD18B5743BF66C61438D68374BDA59E3B9D444C6F8F505
                                                                                                      SHA-512:A677319AC8A2096D95FFC69F22810BD4F083F6BF55B8A77F20D8FB8EE01F2FEE619CE318D1F55C392A8F3A4D635D9285712E2C572E62997014641C36EDC060A2
                                                                                                      Malicious:true
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...*..=...........!.........\......@!....................................... .......................'..........................P.......H.......................l....................................................................................text............................... ..`.rdata..2$.......&..................@..@.data...............................@....idata..............................@....rsrc...H...........................@..@.reloc...&.......(..................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp
                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):499712
                                                                                                      Entropy (8bit):6.414789978441117
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:12288:fJzxYPVsBnxO/R7krZhUgiW6QR7t5k3Ooc8iHkC2eq:fZxvBnxOJ7ki3Ooc8iHkC2e
                                                                                                      MD5:561FA2ABB31DFA8FAB762145F81667C2
                                                                                                      SHA1:C8CCB04EEDAC821A13FAE314A2435192860C72B8
                                                                                                      SHA-256:DF96156F6A548FD6FE5672918DE5AE4509D3C810A57BFFD2A91DE45A3ED5B23B
                                                                                                      SHA-512:7D960AA8E3CCE22D63A6723D7F00C195DE7DE83B877ECA126E339E2D8CC9859E813E05C5C0A5671A75BB717243E9295FD13E5E17D8C6660EB59F5BAEE63A7C43
                                                                                                      Malicious:false
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................................................................Rich...................PE..L.....w>...........!.................-............:|................................~e..............................$...?...d!..<....`.......................p...0..8...8...............................H............................................text............................... ..`.rdata..2*.......0..................@..@.data...h!...0... ...0..............@....rsrc........`.......P..............@..@.reloc...0...p...@...`..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp
                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):348160
                                                                                                      Entropy (8bit):6.542655141037356
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:6144:OcV9z83OtqxnEYmt3NEnvfF+Tbmbw6An8FMciFMNrb3YgxxpbCAOxO2ElvlE:Ooz83OtIEzW+/m/AyF7bCrO/E
                                                                                                      MD5:86F1895AE8C5E8B17D99ECE768A70732
                                                                                                      SHA1:D5502A1D00787D68F548DDEEBBDE1ECA5E2B38CA
                                                                                                      SHA-256:8094AF5EE310714CAEBCCAEEE7769FFB08048503BA478B879EDFEF5F1A24FEFE
                                                                                                      SHA-512:3B7CE2B67056B6E005472B73447D2226677A8CADAE70428873F7EFA5ED11A3B3DBF6B1A42C5B05B1F2B1D8E06FF50DFC6532F043AF8452ED87687EEFBF1791DA
                                                                                                      Malicious:false
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2..S..S..S..Tp..S..S..5S..BX..S..BX...S..BX..Q..BX..S..BX..S..BX..S..Rich.S..........................PE..L.....V>...........!................."............4|.........................`......................................t....C......(.... .......................0..d+..H...8...........................x...H...............l............................text............................... ..`.rdata..@...........................@..@.data... h.......`..................@....rsrc........ ......................@..@.reloc..d+...0...0... ..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp
                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):645592
                                                                                                      Entropy (8bit):6.50414583238337
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:12288:i0zrcH2F3OfwjtWvuFEmhx0Cj37670jwX+E7tFKm0qTYh:iJUOfwh8u9hx0D70NE7tFTYh
                                                                                                      MD5:E477A96C8F2B18D6B5C27BDE49C990BF
                                                                                                      SHA1:E980C9BF41330D1E5BD04556DB4646A0210F7409
                                                                                                      SHA-256:16574F51785B0E2FC29C2C61477EB47BB39F714829999511DC8952B43AB17660
                                                                                                      SHA-512:335A86268E7C0E568B1C30981EC644E6CD332E66F96D2551B58A82515316693C1859D87B4F4B7310CF1AC386CEE671580FDD999C3BCB23ACF2C2282C01C8798C
                                                                                                      Malicious:true
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=S.v..?......!................X..............`......................... ......8......... .................................L................................'......................................................p............................text...............................`.0`.data...............................@.@..rdata..$...........................@.@@.bss..................................@..edata..............................@.0@.idata..L...........................@.0..CRT................................@.0..tls.... ...........................@.0..reloc...'.......(..................@.0B/4......`....0......................@.@B/19..........@......................@..B/35.....M....P......................@..B/51.....`C...`...D..................@..B/63..................8..............@..B/77..................F..............@..B/89..................R..
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp
                                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):717985
                                                                                                      Entropy (8bit):6.514907793208564
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:12288:vTPcYn5c/rPx37/zHBA6a5UeYpthr1CERAgrNuR++Iq5MRxyF8:rPcYn5c/rPx37/zHBA6pFptZ1CEHqMRJ
                                                                                                      MD5:C315D9819BE5253886A2FE4695A87F04
                                                                                                      SHA1:B00F1A3376C763920EF981C95E0E46805E93D53A
                                                                                                      SHA-256:37EB16056F2BC74CCBAE7F9D3E9ECBF58990C9C75AD989CFE49800731954187A
                                                                                                      SHA-512:FEB05FE1110F0F086115BBCC507226DEAFE9BA4A36E360BBCA0276C4E2876C682EB4D6318C801C7467AD9ADD59DCCB2FFDEE4343510A96BAE95384F87CE24AB6
                                                                                                      Malicious:true
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                                      Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................~........................@..............................................@...............................%..................................................................................................................CODE.....}.......~.................. ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................T..............@..P........................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp
                                                                                                      File Type:InnoSetup Log Rollsoft Video Joiner, version 0x30, 4960 bytes, 549163\user, "C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3"
                                                                                                      Category:dropped
                                                                                                      Size (bytes):4960
                                                                                                      Entropy (8bit):4.7817596560367885
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:96:k/WdWQ38Jp1qoEZ9H+eOIh+a7ICSss/LncwGM+Bi:ndWQ3Gp1qwHIhJICSsAnZ
                                                                                                      MD5:110DAC924681BED89C7684803A31AD04
                                                                                                      SHA1:2FD668D70AC895E6BF2567516151EBFE387EA696
                                                                                                      SHA-256:2D777DB8F1ECBD5E4E4897C9039AD1002896CCBEE6C13D5402F43DB46CC650B3
                                                                                                      SHA-512:A15F0814E2F64CFF49E5F8039AA27BD81FBD5A9236C65B815347E72FAB7A2ABB38E3268DFA9EF6702DA1FC6270B5475096516EE7083420675EA032023163E401
                                                                                                      Malicious:false
                                                                                                      Preview:Inno Setup Uninstall Log (b)....................................Rollsoft Video Joiner...........................................................................................................Rollsoft Video Joiner...........................................................................................................0.......`...%................................................................................................................8...........S........[....549163.user:C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3...........(.4.... ............IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...........................................!MAIN....-1..(...dll:kernel32.dll.CreateFileA..............$...dll:kernel32.dll.WriteFile............"...dll:kernel32.dll.CloseHandle........"...dll:kernel32.dll.ExitProcess........%..
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp
                                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):717985
                                                                                                      Entropy (8bit):6.514907793208564
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:12288:vTPcYn5c/rPx37/zHBA6a5UeYpthr1CERAgrNuR++Iq5MRxyF8:rPcYn5c/rPx37/zHBA6pFptZ1CEHqMRJ
                                                                                                      MD5:C315D9819BE5253886A2FE4695A87F04
                                                                                                      SHA1:B00F1A3376C763920EF981C95E0E46805E93D53A
                                                                                                      SHA-256:37EB16056F2BC74CCBAE7F9D3E9ECBF58990C9C75AD989CFE49800731954187A
                                                                                                      SHA-512:FEB05FE1110F0F086115BBCC507226DEAFE9BA4A36E360BBCA0276C4E2876C682EB4D6318C801C7467AD9ADD59DCCB2FFDEE4343510A96BAE95384F87CE24AB6
                                                                                                      Malicious:true
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                                      Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................~........................@..............................................@...............................%..................................................................................................................CODE.....}.......~.................. ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................T..............@..P........................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp
                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):2560
                                                                                                      Entropy (8bit):2.8818118453929262
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                                                                      MD5:A69559718AB506675E907FE49DEB71E9
                                                                                                      SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                                                                      SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                                                                      SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                                                                      Malicious:true
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp
                                                                                                      File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):6144
                                                                                                      Entropy (8bit):4.289297026665552
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:48:Sv1LfWvPcXegCPUo1vlZQrAxoONfHFZONfH3d1xCWMBFNL2pGSS4k+bkg6j0KHc:wfkcXegaJ/ZAYNzcld1xaX12pfSKvkc
                                                                                                      MD5:C8871EFD8AF2CF4D9D42D1FF8FADBF89
                                                                                                      SHA1:D0EACD5322C036554D509C7566F0BCC7607209BD
                                                                                                      SHA-256:E4FC574A01B272C2D0AED0EC813F6D75212E2A15A5F5C417129DD65D69768F40
                                                                                                      SHA-512:2735BB610060F749E26ACD86F2DF2B8A05F2BDD3DCCF3E4B2946EBB21BA0805FB492C474B1EEB2C5B8BF1A421F7C1B8728245F649C644F4A9ECC5BD8770A16F6
                                                                                                      Malicious:false
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....HP..........#............................@.............................`..............................................................<!.......P.......@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc........P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp
                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):23312
                                                                                                      Entropy (8bit):4.596242908851566
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                                                                      MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                                                                      SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                                                                      SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                                                                      SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                                                                      Malicious:false
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\Desktop\GEm3o8pION.exe
                                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):706560
                                                                                                      Entropy (8bit):6.506372502793273
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:12288:3TPcYn5c/rPx37/zHBA6a5UeYpthr1CERAgrNuR++Iq5MRxyF:DPcYn5c/rPx37/zHBA6pFptZ1CEHqMRU
                                                                                                      MD5:C82765EEEA3F81F9645CA834132E6A3A
                                                                                                      SHA1:A4C9C57BE40F203695AB1650710A1BD1DD9559EB
                                                                                                      SHA-256:FEE9826BB655D79504ACD996CCB80FD1D91E934C5CF8287EBBA2484B11658F7A
                                                                                                      SHA-512:AB064F5EF8E781C6AD2DE244515141E61446CDE49FA2F2AF06CC2799C26F55273326C29D5A8DDC755F747F064D199EF2BE14E57F29630BD7F20C5A719BE9513B
                                                                                                      Malicious:true
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................~........................@..............................................@...............................%..................................................................................................................CODE.....}.......~.................. ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................T..............@..P........................................................................................................................................
                                                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                      Entropy (8bit):7.997879776366212
                                                                                                      TrID:
                                                                                                      • Win32 Executable (generic) a (10002005/4) 98.73%
                                                                                                      • Inno Setup installer (109748/4) 1.08%
                                                                                                      • Windows Screen Saver (13104/52) 0.13%
                                                                                                      • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                      File name:GEm3o8pION.exe
                                                                                                      File size:3'587'641 bytes
                                                                                                      MD5:ab8f43d7eb7fe08723fe289589fca3d8
                                                                                                      SHA1:6ece10cc6fa39656f4fd874dc291aa2128b96657
                                                                                                      SHA256:fbedd9cfc2ef50738d490530264b582325212f701a6a36d24ea1edbfe1fdacc7
                                                                                                      SHA512:53ad71e4ae1dc71a733f151715b6c629897a3257dc34dd60a82df7e1375553a90a5b1420e8ca2886d8d5aacb51f6036277363c06460ed5a9f31880de20c83729
                                                                                                      SSDEEP:98304:MyGEkCHj5DY8DyCwgSTG/17lyYFRbL0LHR:mrCHNZKd84YLL0Lx
                                                                                                      TLSH:5BF53331862C7B7FE182A8F05D7E2488CA773D5299F57062058EFEDDAB07981D2E4361
                                                                                                      File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                                                      Icon Hash:2d2e3797b32b2b99
                                                                                                      Entrypoint:0x40a5f8
                                                                                                      Entrypoint Section:CODE
                                                                                                      Digitally signed:false
                                                                                                      Imagebase:0x400000
                                                                                                      Subsystem:windows gui
                                                                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                                                      DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                                      Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                                                                      TLS Callbacks:
                                                                                                      CLR (.Net) Version:
                                                                                                      OS Version Major:1
                                                                                                      OS Version Minor:0
                                                                                                      File Version Major:1
                                                                                                      File Version Minor:0
                                                                                                      Subsystem Version Major:1
                                                                                                      Subsystem Version Minor:0
                                                                                                      Import Hash:884310b1928934402ea6fec1dbd3cf5e
                                                                                                      Instruction
                                                                                                      push ebp
                                                                                                      mov ebp, esp
                                                                                                      add esp, FFFFFFC4h
                                                                                                      push ebx
                                                                                                      push esi
                                                                                                      push edi
                                                                                                      xor eax, eax
                                                                                                      mov dword ptr [ebp-10h], eax
                                                                                                      mov dword ptr [ebp-24h], eax
                                                                                                      call 00007FE554E17BA3h
                                                                                                      call 00007FE554E18DAAh
                                                                                                      call 00007FE554E19039h
                                                                                                      call 00007FE554E190DCh
                                                                                                      call 00007FE554E1B07Bh
                                                                                                      call 00007FE554E1D9E6h
                                                                                                      call 00007FE554E1DB4Dh
                                                                                                      xor eax, eax
                                                                                                      push ebp
                                                                                                      push 0040ACC9h
                                                                                                      push dword ptr fs:[eax]
                                                                                                      mov dword ptr fs:[eax], esp
                                                                                                      xor edx, edx
                                                                                                      push ebp
                                                                                                      push 0040AC92h
                                                                                                      push dword ptr fs:[edx]
                                                                                                      mov dword ptr fs:[edx], esp
                                                                                                      mov eax, dword ptr [0040C014h]
                                                                                                      call 00007FE554E1E5FBh
                                                                                                      call 00007FE554E1E1E6h
                                                                                                      cmp byte ptr [0040B234h], 00000000h
                                                                                                      je 00007FE554E1F0DEh
                                                                                                      call 00007FE554E1E6F8h
                                                                                                      xor eax, eax
                                                                                                      call 00007FE554E18899h
                                                                                                      lea edx, dword ptr [ebp-10h]
                                                                                                      xor eax, eax
                                                                                                      call 00007FE554E1B68Bh
                                                                                                      mov edx, dword ptr [ebp-10h]
                                                                                                      mov eax, 0040CE28h
                                                                                                      call 00007FE554E17C3Ah
                                                                                                      push 00000002h
                                                                                                      push 00000000h
                                                                                                      push 00000001h
                                                                                                      mov ecx, dword ptr [0040CE28h]
                                                                                                      mov dl, 01h
                                                                                                      mov eax, 0040738Ch
                                                                                                      call 00007FE554E1BF1Ah
                                                                                                      mov dword ptr [0040CE2Ch], eax
                                                                                                      xor edx, edx
                                                                                                      push ebp
                                                                                                      push 0040AC4Ah
                                                                                                      push dword ptr fs:[edx]
                                                                                                      mov dword ptr fs:[edx], esp
                                                                                                      call 00007FE554E1E656h
                                                                                                      mov dword ptr [0040CE34h], eax
                                                                                                      mov eax, dword ptr [0040CE34h]
                                                                                                      cmp dword ptr [eax+0Ch], 00000000h
                                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
                                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2c00.rsrc
                                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
                                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                      CODE0x10000x9d300x9e00c3bd95c4b1a8e5199981e0d9b45fd18cFalse0.6052709651898734data6.631765876950794IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                      DATA0xb0000x2500x4001ee71d84f1c77af85f1f5c278f880572False0.306640625data2.751820662285145IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                      BSS0xc0000xe8c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                      .idata0xd0000x9500xa00bb5485bf968b970e5ea81292af2acdbaFalse0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                      .tls0xe0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                      .rdata0xf0000x180x2009ba824905bf9c7922b6fc87a38b74366False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                                      .reloc0x100000x8c40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                                      .rsrc0x110000x2c000x2c00832b6bcc838424b5096e654f4b9808bcFalse0.3259943181818182data4.4933951634356495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                      RT_ICON0x113540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                                                                                                      RT_ICON0x1147c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                                                                                                      RT_ICON0x119e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                                                                                                      RT_ICON0x11ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                                                                                                      RT_STRING0x125740x2f2data0.35543766578249336
                                                                                                      RT_STRING0x128680x30cdata0.3871794871794872
                                                                                                      RT_STRING0x12b740x2cedata0.42618384401114207
                                                                                                      RT_STRING0x12e440x68data0.75
                                                                                                      RT_STRING0x12eac0xb4data0.6277777777777778
                                                                                                      RT_STRING0x12f600xaedata0.5344827586206896
                                                                                                      RT_RCDATA0x130100x2cdata1.2045454545454546
                                                                                                      RT_GROUP_ICON0x1303c0x3edataEnglishUnited States0.8387096774193549
                                                                                                      RT_VERSION0x1307c0x4f4dataEnglishUnited States0.2634069400630915
                                                                                                      RT_MANIFEST0x135700x5a4XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.42590027700831024
                                                                                                      DLLImport
                                                                                                      kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                                                                                                      user32.dllMessageBoxA
                                                                                                      oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                                                                                                      advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                                                                                                      kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                                                                                                      user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                                                                                                      comctl32.dllInitCommonControls
                                                                                                      advapi32.dllAdjustTokenPrivileges
                                                                                                      Language of compilation systemCountry where language is spokenMap
                                                                                                      DutchNetherlands
                                                                                                      EnglishUnited States
                                                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                      2024-12-16T10:41:47.849792+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549790188.119.66.185443TCP
                                                                                                      2024-12-16T10:41:48.643660+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549790188.119.66.185443TCP
                                                                                                      2024-12-16T10:41:53.680694+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549805188.119.66.185443TCP
                                                                                                      2024-12-16T10:41:54.393155+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549805188.119.66.185443TCP
                                                                                                      2024-12-16T10:41:56.058410+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549814188.119.66.185443TCP
                                                                                                      2024-12-16T10:41:56.759239+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549814188.119.66.185443TCP
                                                                                                      2024-12-16T10:41:58.729813+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549821188.119.66.185443TCP
                                                                                                      2024-12-16T10:41:59.440170+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549821188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:01.010077+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549827188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:01.693205+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549827188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:03.269707+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549833188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:03.949692+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549833188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:05.709977+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549838188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:06.390924+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549838188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:08.148825+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549842188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:08.840693+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549842188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:10.428244+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549849188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:11.108600+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549849188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:12.731929+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549855188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:13.476029+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549855188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:15.049558+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549861188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:15.746154+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549861188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:17.321601+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549867188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:18.004099+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549867188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:19.582294+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549873188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:20.263857+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549873188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:22.018623+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549879188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:22.701377+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549879188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:24.272025+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549885188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:24.957137+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549885188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:26.535707+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549894188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:27.217547+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549894188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:28.810935+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549899188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:29.491808+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549899188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:31.069948+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549906188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:31.749882+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549906188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:33.320323+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549912188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:34.004464+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549912188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:35.664778+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549918188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:36.347102+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549918188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:37.928582+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549924188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:38.610462+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549924188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:40.181929+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549930188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:40.862435+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549930188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:42.465890+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549936188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:43.173036+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549936188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:44.739813+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549942188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:45.428387+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549942188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:47.280932+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549948188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:47.961149+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549948188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:49.730065+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549955188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:50.411398+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549955188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:51.989102+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549962188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:52.672393+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549962188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:54.435847+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549968188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:55.115256+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549968188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:56.694464+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549974188.119.66.185443TCP
                                                                                                      2024-12-16T10:42:57.430024+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549974188.119.66.185443TCP
                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                      Dec 16, 2024 10:41:46.361901045 CET49790443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:46.361974001 CET44349790188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:46.362139940 CET49790443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:46.390445948 CET49790443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:46.390482903 CET44349790188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:47.849706888 CET44349790188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:47.849792004 CET49790443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:48.058917046 CET49790443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:48.058937073 CET44349790188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:48.059386969 CET44349790188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:48.059451103 CET49790443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:48.070489883 CET49790443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:48.111341953 CET44349790188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:48.643692017 CET44349790188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:48.643810034 CET49790443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:48.643845081 CET44349790188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:48.643903971 CET49790443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:48.644002914 CET44349790188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:48.644067049 CET49790443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:48.661000013 CET49790443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:48.661031008 CET44349790188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:48.662055969 CET497962024192.168.2.531.214.157.206
                                                                                                      Dec 16, 2024 10:41:48.781949997 CET20244979631.214.157.206192.168.2.5
                                                                                                      Dec 16, 2024 10:41:48.785368919 CET497962024192.168.2.531.214.157.206
                                                                                                      Dec 16, 2024 10:41:48.785506010 CET497962024192.168.2.531.214.157.206
                                                                                                      Dec 16, 2024 10:41:48.905177116 CET20244979631.214.157.206192.168.2.5
                                                                                                      Dec 16, 2024 10:41:48.905361891 CET497962024192.168.2.531.214.157.206
                                                                                                      Dec 16, 2024 10:41:49.025176048 CET20244979631.214.157.206192.168.2.5
                                                                                                      Dec 16, 2024 10:41:50.026490927 CET20244979631.214.157.206192.168.2.5
                                                                                                      Dec 16, 2024 10:41:50.076781034 CET497962024192.168.2.531.214.157.206
                                                                                                      Dec 16, 2024 10:41:52.035425901 CET49805443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:52.035475016 CET44349805188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:52.035579920 CET49805443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:52.037385941 CET49805443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:52.037400961 CET44349805188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:53.680591106 CET44349805188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:53.680694103 CET49805443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:53.681164980 CET49805443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:53.681176901 CET44349805188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:53.681360006 CET49805443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:53.681365013 CET44349805188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:54.393213034 CET44349805188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:54.393301964 CET49805443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:54.393313885 CET44349805188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:54.393367052 CET49805443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:54.484023094 CET49805443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:54.484040976 CET44349805188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:54.596879005 CET49814443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:54.596910954 CET44349814188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:54.596993923 CET49814443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:54.597379923 CET49814443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:54.597393990 CET44349814188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:56.058290958 CET44349814188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:56.058409929 CET49814443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:56.059006929 CET49814443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:56.059016943 CET44349814188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:56.059273958 CET49814443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:56.059279919 CET44349814188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:56.759290934 CET44349814188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:56.759390116 CET44349814188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:56.759419918 CET49814443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:56.759462118 CET49814443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:56.759661913 CET49814443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:56.759679079 CET44349814188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:56.760550022 CET498202024192.168.2.531.214.157.206
                                                                                                      Dec 16, 2024 10:41:56.880290985 CET20244982031.214.157.206192.168.2.5
                                                                                                      Dec 16, 2024 10:41:56.880467892 CET498202024192.168.2.531.214.157.206
                                                                                                      Dec 16, 2024 10:41:56.895561934 CET498202024192.168.2.531.214.157.206
                                                                                                      Dec 16, 2024 10:41:56.895641088 CET498202024192.168.2.531.214.157.206
                                                                                                      Dec 16, 2024 10:41:57.015566111 CET20244982031.214.157.206192.168.2.5
                                                                                                      Dec 16, 2024 10:41:57.058979988 CET20244982031.214.157.206192.168.2.5
                                                                                                      Dec 16, 2024 10:41:57.085680962 CET49821443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:57.085732937 CET44349821188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:57.085803032 CET49821443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:57.086596012 CET49821443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:57.086608887 CET44349821188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:57.849404097 CET20244982031.214.157.206192.168.2.5
                                                                                                      Dec 16, 2024 10:41:57.849478960 CET498202024192.168.2.531.214.157.206
                                                                                                      Dec 16, 2024 10:41:58.729686975 CET44349821188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:58.729813099 CET49821443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:58.730331898 CET49821443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:58.730348110 CET44349821188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:58.730526924 CET49821443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:58.730537891 CET44349821188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:59.440042019 CET44349821188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:59.440139055 CET44349821188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:59.440169096 CET49821443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:59.440236092 CET49821443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:59.440355062 CET49821443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:59.440397024 CET44349821188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:59.548970938 CET49827443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:59.549009085 CET44349827188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:41:59.549098015 CET49827443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:59.551168919 CET49827443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:41:59.551189899 CET44349827188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:01.009994030 CET44349827188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:01.010077000 CET49827443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:01.010514975 CET49827443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:01.010519981 CET44349827188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:01.010706902 CET49827443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:01.010711908 CET44349827188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:01.693198919 CET44349827188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:01.693280935 CET44349827188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:01.693440914 CET49827443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:01.693440914 CET49827443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:01.693670034 CET49827443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:01.693691015 CET44349827188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:01.814924955 CET49833443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:01.814979076 CET44349833188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:01.815049887 CET49833443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:01.815437078 CET49833443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:01.815455914 CET44349833188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:03.269587040 CET44349833188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:03.269706964 CET49833443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:03.270329952 CET49833443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:03.270340919 CET44349833188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:03.270490885 CET49833443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:03.270495892 CET44349833188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:03.949727058 CET44349833188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:03.949800014 CET44349833188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:03.949798107 CET49833443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:03.949853897 CET49833443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:03.950064898 CET49833443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:03.950083017 CET44349833188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:04.065768003 CET49838443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:04.065821886 CET44349838188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:04.065913916 CET49838443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:04.066210032 CET49838443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:04.066220999 CET44349838188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:05.709825039 CET44349838188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:05.709976912 CET49838443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:05.712896109 CET49838443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:05.712910891 CET44349838188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:05.713144064 CET49838443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:05.713150024 CET44349838188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:06.390916109 CET44349838188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:06.390984058 CET49838443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:06.390991926 CET44349838188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:06.391036987 CET49838443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:06.391397953 CET49838443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:06.391424894 CET44349838188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:06.501868010 CET49842443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:06.501910925 CET44349842188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:06.501998901 CET49842443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:06.502331972 CET49842443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:06.502347946 CET44349842188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:08.148683071 CET44349842188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:08.148824930 CET49842443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:08.149492979 CET49842443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:08.149506092 CET44349842188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:08.149703979 CET49842443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:08.149708986 CET44349842188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:08.840795040 CET44349842188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:08.840881109 CET49842443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:08.840910912 CET44349842188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:08.840962887 CET49842443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:08.840972900 CET44349842188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:08.841080904 CET49842443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:08.848211050 CET49842443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:08.848225117 CET44349842188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:08.971890926 CET49849443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:08.971939087 CET44349849188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:08.972023964 CET49849443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:08.972400904 CET49849443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:08.972410917 CET44349849188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:10.427943945 CET44349849188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:10.428244114 CET49849443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:10.428845882 CET49849443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:10.428855896 CET44349849188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:10.429091930 CET49849443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:10.429096937 CET44349849188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:11.108649015 CET44349849188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:11.108716011 CET49849443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:11.108731031 CET44349849188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:11.108855009 CET49849443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:11.108978987 CET49849443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:11.108998060 CET44349849188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:11.220776081 CET49855443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:11.220882893 CET44349855188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:11.220999002 CET49855443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:11.221290112 CET49855443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:11.221335888 CET44349855188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:12.731827021 CET44349855188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:12.731929064 CET49855443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:12.732428074 CET49855443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:12.732443094 CET44349855188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:12.732605934 CET49855443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:12.732611895 CET44349855188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:13.476085901 CET44349855188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:13.476188898 CET44349855188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:13.476231098 CET49855443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:13.476286888 CET49855443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:13.476614952 CET49855443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:13.476651907 CET44349855188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:13.595612049 CET49861443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:13.595650911 CET44349861188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:13.595752954 CET49861443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:13.596142054 CET49861443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:13.596154928 CET44349861188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:15.049464941 CET44349861188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:15.049557924 CET49861443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:15.050034046 CET49861443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:15.050045967 CET44349861188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:15.050219059 CET49861443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:15.050225973 CET44349861188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:15.746202946 CET44349861188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:15.746274948 CET49861443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:15.746306896 CET44349861188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:15.746325970 CET44349861188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:15.746360064 CET49861443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:15.746376038 CET49861443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:15.746469021 CET49861443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:15.746485949 CET44349861188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:15.861696005 CET49867443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:15.861802101 CET44349867188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:15.861905098 CET49867443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:15.862349987 CET49867443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:15.862385035 CET44349867188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:17.321436882 CET44349867188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:17.321600914 CET49867443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:17.322104931 CET49867443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:17.322128057 CET44349867188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:17.322339058 CET49867443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:17.322351933 CET44349867188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:18.004189014 CET44349867188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:18.004296064 CET49867443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:18.004357100 CET44349867188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:18.004390001 CET44349867188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:18.004421949 CET49867443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:18.004456043 CET49867443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:18.004543066 CET49867443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:18.004576921 CET44349867188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:18.127871990 CET49873443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:18.127912045 CET44349873188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:18.127985954 CET49873443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:18.128281116 CET49873443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:18.128294945 CET44349873188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:19.582212925 CET44349873188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:19.582293987 CET49873443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:19.582895994 CET49873443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:19.582906008 CET44349873188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:19.583108902 CET49873443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:19.583115101 CET44349873188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:20.263973951 CET44349873188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:20.264116049 CET49873443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:20.264131069 CET44349873188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:20.264162064 CET44349873188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:20.264178038 CET49873443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:20.264210939 CET49873443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:20.264475107 CET49873443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:20.264489889 CET44349873188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:20.376916885 CET49879443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:20.376974106 CET44349879188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:20.377428055 CET49879443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:20.377428055 CET49879443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:20.377470970 CET44349879188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:22.018529892 CET44349879188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:22.018623114 CET49879443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:22.019185066 CET49879443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:22.019191027 CET44349879188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:22.019382954 CET49879443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:22.019387007 CET44349879188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:22.701412916 CET44349879188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:22.701477051 CET44349879188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:22.701658010 CET49879443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:22.701971054 CET49879443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:22.701992989 CET44349879188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:22.814512014 CET49885443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:22.814559937 CET44349885188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:22.814635038 CET49885443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:22.814922094 CET49885443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:22.814935923 CET44349885188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:24.271881104 CET44349885188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:24.272025108 CET49885443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:24.292792082 CET49885443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:24.292828083 CET44349885188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:24.292989016 CET49885443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:24.293000937 CET44349885188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:24.957201004 CET44349885188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:24.957273006 CET49885443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:24.957302094 CET44349885188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:24.957319021 CET44349885188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:24.957343102 CET49885443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:24.957370996 CET49885443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:24.957712889 CET49885443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:24.957727909 CET44349885188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:25.079722881 CET49894443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:25.079775095 CET44349894188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:25.079849005 CET49894443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:25.080173016 CET49894443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:25.080187082 CET44349894188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:26.535586119 CET44349894188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:26.535706997 CET49894443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:26.536392927 CET49894443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:26.536402941 CET44349894188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:26.536577940 CET49894443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:26.536582947 CET44349894188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:27.217612982 CET44349894188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:27.217691898 CET49894443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:27.217711926 CET44349894188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:27.217730045 CET44349894188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:27.217765093 CET49894443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:27.217796087 CET49894443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:27.218117952 CET49894443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:27.218137026 CET44349894188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:27.351371050 CET49899443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:27.351464987 CET44349899188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:27.351538897 CET49899443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:27.352135897 CET49899443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:27.352166891 CET44349899188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:28.810796022 CET44349899188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:28.810935020 CET49899443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:28.811837912 CET49899443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:28.811866999 CET44349899188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:28.813785076 CET49899443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:28.813803911 CET44349899188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:29.491872072 CET44349899188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:29.491955042 CET49899443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:29.491969109 CET44349899188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:29.492027998 CET49899443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:29.492811918 CET49899443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:29.492847919 CET44349899188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:29.610913038 CET49906443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:29.610964060 CET44349906188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:29.611062050 CET49906443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:29.611356974 CET49906443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:29.611377001 CET44349906188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:31.069849968 CET44349906188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:31.069947958 CET49906443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:31.070470095 CET49906443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:31.070491076 CET44349906188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:31.070739031 CET49906443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:31.070750952 CET44349906188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:31.749946117 CET44349906188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:31.750066996 CET49906443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:31.750081062 CET44349906188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:31.750124931 CET49906443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:31.750261068 CET49906443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:31.750279903 CET44349906188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:31.861216068 CET49912443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:31.861253977 CET44349912188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:31.861341953 CET49912443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:31.861638069 CET49912443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:31.861649990 CET44349912188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:33.320249081 CET44349912188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:33.320322990 CET49912443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:33.320724964 CET49912443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:33.320745945 CET44349912188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:33.320903063 CET49912443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:33.320915937 CET44349912188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:34.004542112 CET44349912188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:34.004620075 CET49912443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:34.004631996 CET44349912188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:34.004678011 CET49912443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:34.004728079 CET44349912188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:34.004780054 CET49912443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:34.008790970 CET49912443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:34.008800983 CET44349912188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:34.205492973 CET49918443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:34.205533981 CET44349918188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:34.205610037 CET49918443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:34.205890894 CET49918443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:34.205903053 CET44349918188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:35.664524078 CET44349918188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:35.664777994 CET49918443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:35.665218115 CET49918443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:35.665232897 CET44349918188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:35.665370941 CET49918443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:35.665383101 CET44349918188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:36.347204924 CET44349918188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:36.347333908 CET49918443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:36.347366095 CET44349918188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:36.347414970 CET44349918188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:36.347460985 CET49918443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:36.347460985 CET49918443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:36.347748041 CET49918443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:36.347769976 CET44349918188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:36.470515966 CET49924443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:36.470571041 CET44349924188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:36.470685005 CET49924443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:36.470982075 CET49924443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:36.470995903 CET44349924188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:37.927150011 CET44349924188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:37.928581953 CET49924443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:37.929076910 CET49924443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:37.929083109 CET44349924188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:37.929292917 CET49924443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:37.929296017 CET44349924188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:38.610479116 CET44349924188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:38.610583067 CET44349924188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:38.610750914 CET49924443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:38.610752106 CET49924443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:38.611033916 CET49924443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:38.611049891 CET44349924188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:38.724020958 CET49930443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:38.724064112 CET44349930188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:38.724183083 CET49930443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:38.724447966 CET49930443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:38.724457979 CET44349930188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:40.181776047 CET44349930188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:40.181929111 CET49930443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:40.182739019 CET49930443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:40.182748079 CET44349930188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:40.182807922 CET49930443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:40.182813883 CET44349930188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:40.862502098 CET44349930188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:40.862575054 CET49930443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:40.862591028 CET44349930188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:40.862659931 CET44349930188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:40.862704039 CET49930443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:40.862735033 CET49930443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:40.862932920 CET49930443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:40.862951040 CET44349930188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:40.971690893 CET49936443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:40.971744061 CET44349936188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:40.972949982 CET49936443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:40.973288059 CET49936443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:40.973305941 CET44349936188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:42.465527058 CET44349936188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:42.465889931 CET49936443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:42.466295004 CET49936443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:42.466315031 CET44349936188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:42.466519117 CET49936443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:42.466531992 CET44349936188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:43.173088074 CET44349936188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:43.173161983 CET49936443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:43.173182011 CET44349936188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:43.173242092 CET49936443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:43.173384905 CET49936443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:43.173430920 CET44349936188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:43.282882929 CET49942443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:43.282938957 CET44349942188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:43.283020020 CET49942443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:43.283355951 CET49942443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:43.283371925 CET44349942188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:44.739665031 CET44349942188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:44.739813089 CET49942443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:44.740358114 CET49942443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:44.740367889 CET44349942188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:44.740533113 CET49942443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:44.740537882 CET44349942188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:45.428488970 CET44349942188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:45.428591013 CET49942443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:45.428603888 CET44349942188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:45.428647995 CET49942443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:45.428687096 CET44349942188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:45.428741932 CET49942443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:45.428777933 CET49942443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:45.428792953 CET44349942188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:45.629901886 CET49948443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:45.629985094 CET44349948188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:45.630047083 CET49948443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:45.631014109 CET49948443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:45.631028891 CET44349948188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:47.279905081 CET44349948188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:47.280931950 CET49948443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:47.281428099 CET49948443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:47.281438112 CET44349948188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:47.281645060 CET49948443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:47.281651020 CET44349948188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:47.960916042 CET44349948188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:47.960990906 CET44349948188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:47.961030006 CET49948443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:47.961061001 CET49948443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:47.961257935 CET49948443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:47.961281061 CET44349948188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:48.087574005 CET49955443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:48.087625027 CET44349955188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:48.087704897 CET49955443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:48.088188887 CET49955443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:48.088203907 CET44349955188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:49.730004072 CET44349955188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:49.730065107 CET49955443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:49.730609894 CET49955443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:49.730618954 CET44349955188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:49.732753992 CET49955443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:49.732758999 CET44349955188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:50.411159039 CET44349955188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:50.411235094 CET49955443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:50.411256075 CET44349955188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:50.411320925 CET49955443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:50.411354065 CET44349955188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:50.411426067 CET49955443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:50.411426067 CET49955443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:50.534904957 CET49962443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:50.534949064 CET44349962188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:50.535264969 CET49962443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:50.535264969 CET49962443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:50.535300970 CET44349962188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:50.716921091 CET49955443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:50.716959000 CET44349955188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:51.988934040 CET44349962188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:51.989101887 CET49962443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:51.989770889 CET49962443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:51.989794970 CET44349962188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:51.992233038 CET49962443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:51.992243052 CET44349962188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:52.672430038 CET44349962188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:52.672517061 CET44349962188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:52.672615051 CET49962443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:52.672615051 CET49962443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:52.672892094 CET49962443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:52.672910929 CET44349962188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:52.788068056 CET49968443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:52.788146973 CET44349968188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:52.788425922 CET49968443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:52.788811922 CET49968443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:52.788841009 CET44349968188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:54.435730934 CET44349968188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:54.435847044 CET49968443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:54.436481953 CET49968443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:54.436510086 CET44349968188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:54.439101934 CET49968443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:54.439115047 CET44349968188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:55.115220070 CET44349968188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:55.115298033 CET44349968188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:55.115345955 CET49968443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:55.115397930 CET49968443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:55.115784883 CET49968443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:55.115823030 CET44349968188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:55.244461060 CET49974443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:55.244566917 CET44349974188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:55.244697094 CET49974443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:55.244965076 CET49974443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:55.245002031 CET44349974188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:56.694227934 CET44349974188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:56.694463968 CET49974443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:56.694974899 CET49974443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:56.695004940 CET44349974188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:56.700814962 CET49974443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:56.700830936 CET44349974188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:57.430027008 CET44349974188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:57.430083036 CET49974443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:57.430110931 CET44349974188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:57.430125952 CET44349974188.119.66.185192.168.2.5
                                                                                                      Dec 16, 2024 10:42:57.430155993 CET49974443192.168.2.5188.119.66.185
                                                                                                      Dec 16, 2024 10:42:57.430182934 CET49974443192.168.2.5188.119.66.185
                                                                                                      • 188.119.66.185
                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      0192.168.2.549790188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:41:48 UTC283OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b82a8dcd6c946851e300888b3250aa15d005633775b0e650f3ba1e9c95b1c92975ccf55bc592fe5a818ece02a1b7e2984c57cad7021dda30201bd2318f HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:41:48 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:41:48 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:41:48 UTC802INData Raw: 33 31 36 0d 0a 38 62 37 32 33 63 36 38 65 65 31 38 34 30 33 63 36 36 30 66 62 66 65 30 33 38 34 63 32 37 62 36 62 63 38 66 38 30 32 32 34 63 62 64 33 62 63 31 39 30 32 34 39 66 37 65 31 36 66 65 30 34 64 64 65 37 36 37 34 62 62 33 35 63 38 64 31 65 33 66 37 38 37 61 61 30 61 66 30 64 39 62 66 35 30 31 64 32 39 39 62 31 63 61 32 39 37 34 64 35 66 36 34 63 63 34 39 36 66 63 35 32 64 36 64 62 39 63 35 66 61 64 62 36 66 34 63 31 30 33 30 32 63 33 64 34 31 62 31 66 64 64 33 31 33 61 31 62 64 32 33 32 39 32 64 35 64 30 39 31 35 37 34 39 63 39 37 30 33 34 66 32 64 34 30 33 34 62 36 64 31 36 36 63 63 63 66 37 31 31 36 38 62 62 66 37 35 36 61 34 65 66 65 62 35 32 61 61 37 66 63 31 63 32 33 66 66 34 66 37 63 37 66 32 34 38 31 32 38 64 34 36 39 39 33 65 61 35 33 37
                                                                                                      Data Ascii: 3168b723c68ee18403c660fbfe0384c27b6bc8f80224cbd3bc190249f7e16fe04dde7674bb35c8d1e3f787aa0af0d9bf501d299b1ca2974d5f64cc496fc52d6db9c5fadb6f4c10302c3d41b1fdd313a1bd23292d5d0915749c97034f2d4034b6d166cccf71168bbf756a4efeb52aa7fc1c23ff4f7c7f248128d46993ea537


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      1192.168.2.549805188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:41:53 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:41:54 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:41:54 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:41:54 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      2192.168.2.549814188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:41:56 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:41:56 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:41:56 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:41:56 UTC658INData Raw: 32 38 36 0d 0a 38 62 37 32 32 61 37 37 65 34 31 66 35 35 32 63 33 34 34 38 61 33 65 34 36 64 32 30 37 66 65 38 62 33 38 66 38 35 33 66 35 33 62 39 33 62 64 64 38 63 32 35 39 39 36 66 35 39 62 61 34 39 38 36 38 32 32 35 30 63 65 61 31 38 64 65 31 32 33 62 36 63 33 35 65 34 65 38 35 37 65 61 61 65 34 30 64 64 38 36 62 31 63 62 33 32 37 66 64 33 66 34 35 32 63 35 39 64 66 32 34 39 63 39 64 30 39 39 34 62 61 64 62 32 66 31 64 66 30 61 30 37 63 65 64 63 30 34 31 65 64 65 33 33 32 66 31 65 64 62 32 65 38 64 64 30 64 33 38 61 35 66 34 61 63 62 36 65 33 37 66 39 64 37 30 35 35 35 36 66 31 30 37 39 63 63 66 34 31 63 36 38 62 66 66 30 34 31 61 61 65 66 66 35 35 33 61 63 37 33 63 63 63 62 32 31 66 35 66 33 63 64 65 34 34 38 30 65 38 64 35 38 39 38 32 30 61 65 33 32
                                                                                                      Data Ascii: 2868b722a77e41f552c3448a3e46d207fe8b38f853f53b93bdd8c25996f59ba498682250cea18de123b6c35e4e857eaae40dd86b1cb327fd3f452c59df249c9d0994badb2f1df0a07cedc041ede332f1edb2e8dd0d38a5f4acb6e37f9d705556f1079ccf41c68bff041aaeff553ac73cccb21f5f3cde4480e8d589820ae32


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      3192.168.2.549821188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:41:58 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:41:59 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:41:59 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:41:59 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      4192.168.2.549827188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:42:01 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:42:01 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:42:01 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:42:01 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      5192.168.2.549833188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:42:03 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:42:03 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:42:03 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:42:03 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      6192.168.2.549838188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:42:05 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:42:06 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:42:06 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:42:06 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      7192.168.2.549842188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:42:08 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:42:08 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:42:08 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:42:08 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      8192.168.2.549849188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:42:10 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:42:11 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:42:10 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:42:11 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      9192.168.2.549855188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:42:12 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:42:13 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:42:13 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:42:13 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      10192.168.2.549861188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:42:15 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:42:15 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:42:15 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:42:15 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      11192.168.2.549867188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:42:17 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:42:18 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:42:17 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:42:18 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      12192.168.2.549873188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:42:19 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:42:20 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:42:20 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:42:20 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      13192.168.2.549879188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:42:22 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:42:22 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:42:22 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:42:22 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      14192.168.2.549885188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:42:24 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:42:24 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:42:24 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:42:24 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      15192.168.2.549894188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:42:26 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:42:27 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:42:26 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:42:27 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      16192.168.2.549899188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:42:28 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:42:29 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:42:29 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:42:29 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      17192.168.2.549906188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:42:31 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:42:31 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:42:31 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:42:31 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      18192.168.2.549912188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:42:33 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:42:34 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:42:33 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:42:34 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      19192.168.2.549918188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:42:35 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:42:36 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:42:36 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:42:36 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      20192.168.2.549924188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:42:37 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:42:38 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:42:38 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:42:38 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      21192.168.2.549930188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:42:40 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:42:40 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:42:40 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:42:40 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      22192.168.2.549936188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:42:42 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:42:43 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:42:42 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:42:43 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      23192.168.2.549942188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:42:44 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:42:45 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:42:45 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:42:45 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      24192.168.2.549948188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:42:47 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:42:47 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:42:47 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:42:47 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      25192.168.2.549955188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:42:49 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:42:50 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:42:50 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:42:50 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      26192.168.2.549962188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:42:51 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:42:52 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:42:52 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:42:52 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      27192.168.2.549968188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:42:54 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:42:55 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:42:54 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:42:55 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      28192.168.2.549974188.119.66.1854431472C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-16 09:42:56 UTC291OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b92a8dcd6c946a4fbd41879e7c4ce71bc34f7f632ef3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73388d6d3955e HTTP/1.1
                                                                                                      User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                      Host: 188.119.66.185
                                                                                                      2024-12-16 09:42:57 UTC200INHTTP/1.1 200 OK
                                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                                      Date: Mon, 16 Dec 2024 09:42:57 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/7.4.33
                                                                                                      2024-12-16 09:42:57 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: e8b723663ec13250


                                                                                                      Click to jump to process

                                                                                                      Click to jump to process

                                                                                                      Click to dive into process behavior distribution

                                                                                                      Click to jump to process

                                                                                                      Target ID:0
                                                                                                      Start time:04:40:51
                                                                                                      Start date:16/12/2024
                                                                                                      Path:C:\Users\user\Desktop\GEm3o8pION.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Users\user\Desktop\GEm3o8pION.exe"
                                                                                                      Imagebase:0x400000
                                                                                                      File size:3'587'641 bytes
                                                                                                      MD5 hash:AB8F43D7EB7FE08723FE289589FCA3D8
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:low
                                                                                                      Has exited:false

                                                                                                      Target ID:1
                                                                                                      Start time:04:40:51
                                                                                                      Start date:16/12/2024
                                                                                                      Path:C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Users\user\AppData\Local\Temp\is-IQ9ND.tmp\GEm3o8pION.tmp" /SL5="$20456,3338584,56832,C:\Users\user\Desktop\GEm3o8pION.exe"
                                                                                                      Imagebase:0x400000
                                                                                                      File size:706'560 bytes
                                                                                                      MD5 hash:C82765EEEA3F81F9645CA834132E6A3A
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000001.00000002.3291322769.0000000005E10000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      Antivirus matches:
                                                                                                      • Detection: 3%, ReversingLabs
                                                                                                      Reputation:low
                                                                                                      Has exited:false

                                                                                                      Target ID:3
                                                                                                      Start time:04:40:53
                                                                                                      Start date:16/12/2024
                                                                                                      Path:C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe" -i
                                                                                                      Imagebase:0x400000
                                                                                                      File size:3'145'160 bytes
                                                                                                      MD5 hash:563B61FE1BF69C7FA387A085C07ABB31
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000003.00000002.3290651813.0000000002736000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000003.00000000.2053718478.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe, Author: Joe Security
                                                                                                      Antivirus matches:
                                                                                                      • Detection: 100%, Joe Sandbox ML
                                                                                                      Reputation:low
                                                                                                      Has exited:false

                                                                                                      Reset < >

                                                                                                        Execution Graph

                                                                                                        Execution Coverage:21.3%
                                                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                                                        Signature Coverage:2.4%
                                                                                                        Total number of Nodes:1520
                                                                                                        Total number of Limit Nodes:22
                                                                                                        execution_graph 5452 407548 5453 407554 CloseHandle 5452->5453 5454 40755d 5452->5454 5453->5454 6689 402b48 RaiseException 5894 407749 5895 4076dc WriteFile 5894->5895 5896 407724 5894->5896 5897 4076e8 5895->5897 5898 4076ef 5895->5898 5896->5894 5902 4077e0 5896->5902 5899 40748c 35 API calls 5897->5899 5900 407700 5898->5900 5901 4073ec 34 API calls 5898->5901 5899->5898 5901->5900 5903 4078db InterlockedExchange 5902->5903 5905 407890 5902->5905 5904 4078e7 5903->5904 6690 40294a 6691 402952 6690->6691 6692 403554 4 API calls 6691->6692 6693 402967 6691->6693 6692->6691 6694 403f4a 6695 403f53 6694->6695 6696 403f5c 6694->6696 6698 403f07 6695->6698 6701 403f09 6698->6701 6700 403f3c 6700->6696 6703 403e9c 6701->6703 6704 403154 4 API calls 6701->6704 6709 403f3d 6701->6709 6721 403e9c 6701->6721 6702 403ef2 6706 402674 4 API calls 6702->6706 6703->6700 6703->6702 6707 403ea9 6703->6707 6712 403e8e 6703->6712 6704->6701 6710 403ecf 6706->6710 6707->6710 6711 402674 4 API calls 6707->6711 6709->6696 6710->6696 6711->6710 6713 403e4c 6712->6713 6714 403e67 6713->6714 6715 403e62 6713->6715 6716 403e7b 6713->6716 6719 403e78 6714->6719 6720 402674 4 API calls 6714->6720 6718 403cc8 4 API calls 6715->6718 6717 402674 4 API calls 6716->6717 6717->6719 6718->6714 6719->6702 6719->6707 6720->6719 6722 403ed7 6721->6722 6727 403ea9 6721->6727 6723 403ef2 6722->6723 6724 403e8e 4 API calls 6722->6724 6725 402674 4 API calls 6723->6725 6726 403ee6 6724->6726 6729 403ecf 6725->6729 6726->6723 6726->6727 6728 402674 4 API calls 6727->6728 6727->6729 6728->6729 6729->6701 6248 40ac4f 6249 40abc1 6248->6249 6250 4094d8 9 API calls 6249->6250 6252 40abed 6249->6252 6250->6252 6251 40ac06 6253 40ac1a 6251->6253 6254 40ac0f DestroyWindow 6251->6254 6252->6251 6255 40ac00 RemoveDirectoryA 6252->6255 6256 40ac42 6253->6256 6257 40357c 4 API calls 6253->6257 6254->6253 6255->6251 6258 40ac38 6257->6258 6259 4025ac 4 API calls 6258->6259 6259->6256 6260 403a52 6261 403a74 6260->6261 6262 403a5a WriteFile 6260->6262 6262->6261 6263 403a78 GetLastError 6262->6263 6263->6261 6264 402654 6265 403154 4 API calls 6264->6265 6266 402614 6265->6266 6267 402632 6266->6267 6268 403154 4 API calls 6266->6268 6267->6267 6268->6267 6269 40ac56 6270 40ac5d 6269->6270 6272 40ac88 6269->6272 6279 409448 6270->6279 6274 403198 4 API calls 6272->6274 6273 40ac62 6273->6272 6276 40ac80 MessageBoxA 6273->6276 6275 40acc0 6274->6275 6277 403198 4 API calls 6275->6277 6276->6272 6278 40acc8 6277->6278 6280 409454 GetCurrentProcess OpenProcessToken 6279->6280 6281 4094af ExitWindowsEx 6279->6281 6282 409466 6280->6282 6283 40946a LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6280->6283 6281->6282 6282->6273 6283->6281 6283->6282 6738 40995e 6739 409960 6738->6739 6740 409982 6739->6740 6741 40999e CallWindowProcA 6739->6741 6741->6740 6742 409960 6743 409982 6742->6743 6744 40996f 6742->6744 6744->6743 6745 40999e CallWindowProcA 6744->6745 6745->6743 6746 405160 6747 405173 6746->6747 6748 404e58 33 API calls 6747->6748 6749 405187 6748->6749 6284 402e64 6285 402e69 6284->6285 6286 402e7a RtlUnwind 6285->6286 6287 402e5e 6285->6287 6288 402e9d 6286->6288 5906 40766c SetFilePointer 5907 4076a3 5906->5907 5908 407693 GetLastError 5906->5908 5908->5907 5909 40769c 5908->5909 5910 40748c 35 API calls 5909->5910 5910->5907 6301 40667c IsDBCSLeadByte 6302 406694 6301->6302 6762 403f7d 6763 403fa2 6762->6763 6766 403f84 6762->6766 6765 403e8e 4 API calls 6763->6765 6763->6766 6764 403f8c 6765->6766 6766->6764 6767 402674 4 API calls 6766->6767 6768 403fca 6767->6768 6769 403d02 6771 403d12 6769->6771 6770 403ddf ExitProcess 6771->6770 6772 403db8 6771->6772 6775 403dea 6771->6775 6779 403da4 6771->6779 6780 403d8f MessageBoxA 6771->6780 6773 403cc8 4 API calls 6772->6773 6774 403dc2 6773->6774 6776 403cc8 4 API calls 6774->6776 6777 403dcc 6776->6777 6789 4019dc 6777->6789 6785 403fe4 6779->6785 6780->6772 6781 403dd1 6781->6770 6781->6775 6786 403fe8 6785->6786 6787 403f07 4 API calls 6786->6787 6788 404006 6787->6788 6790 401abb 6789->6790 6791 4019ed 6789->6791 6790->6781 6792 401a04 RtlEnterCriticalSection 6791->6792 6793 401a0e LocalFree 6791->6793 6792->6793 6794 401a41 6793->6794 6795 401a2f VirtualFree 6794->6795 6796 401a49 6794->6796 6795->6794 6797 401a70 LocalFree 6796->6797 6798 401a87 6796->6798 6797->6797 6797->6798 6799 401aa9 RtlDeleteCriticalSection 6798->6799 6800 401a9f RtlLeaveCriticalSection 6798->6800 6799->6781 6800->6799 6307 404206 6308 4041cc 6307->6308 6309 40420a 6307->6309 6310 403154 4 API calls 6309->6310 6311 404282 6309->6311 6312 404323 6310->6312 6313 402c08 6314 402c82 6313->6314 6317 402c19 6313->6317 6315 402c56 RtlUnwind 6316 403154 4 API calls 6315->6316 6316->6314 6317->6314 6317->6315 6320 402b28 6317->6320 6321 402b31 RaiseException 6320->6321 6322 402b47 6320->6322 6321->6322 6322->6315 6323 408c10 6324 408c17 6323->6324 6325 403198 4 API calls 6324->6325 6333 408cb1 6325->6333 6326 408cdc 6327 4031b8 4 API calls 6326->6327 6328 408d69 6327->6328 6329 408cc8 6331 4032fc 18 API calls 6329->6331 6330 403278 18 API calls 6330->6333 6331->6326 6332 4032fc 18 API calls 6332->6333 6333->6326 6333->6329 6333->6330 6333->6332 6338 40a814 6339 40a839 6338->6339 6340 40993c 29 API calls 6339->6340 6343 40a83e 6340->6343 6341 40a891 6372 4026c4 GetSystemTime 6341->6372 6343->6341 6346 408dd8 18 API calls 6343->6346 6344 40a896 6345 409330 46 API calls 6344->6345 6347 40a89e 6345->6347 6348 40a86d 6346->6348 6349 4031e8 18 API calls 6347->6349 6352 40a875 MessageBoxA 6348->6352 6350 40a8ab 6349->6350 6351 406928 19 API calls 6350->6351 6353 40a8b8 6351->6353 6352->6341 6354 40a882 6352->6354 6355 4066c0 19 API calls 6353->6355 6356 405864 19 API calls 6354->6356 6357 40a8c8 6355->6357 6356->6341 6358 406638 19 API calls 6357->6358 6359 40a8d9 6358->6359 6360 403340 18 API calls 6359->6360 6361 40a8e7 6360->6361 6362 4031e8 18 API calls 6361->6362 6363 40a8f7 6362->6363 6364 4074e0 37 API calls 6363->6364 6365 40a936 6364->6365 6366 402594 18 API calls 6365->6366 6367 40a956 6366->6367 6368 407a28 19 API calls 6367->6368 6369 40a998 6368->6369 6370 407cb8 35 API calls 6369->6370 6371 40a9bf 6370->6371 6372->6344 5450 407017 5451 407008 SetErrorMode 5450->5451 6373 403018 6374 403070 6373->6374 6375 403025 6373->6375 6376 40302a RtlUnwind 6375->6376 6377 40304e 6376->6377 6379 402f78 6377->6379 6380 402be8 6377->6380 6381 402bf1 RaiseException 6380->6381 6382 402c04 6380->6382 6381->6382 6382->6374 6387 40901e 6388 409010 6387->6388 6389 408fac Wow64RevertWow64FsRedirection 6388->6389 6390 409018 6389->6390 6391 409020 SetLastError 6392 409029 6391->6392 6407 403a28 ReadFile 6408 403a46 6407->6408 6409 403a49 GetLastError 6407->6409 5911 40762c ReadFile 5912 407663 5911->5912 5913 40764c 5911->5913 5914 407652 GetLastError 5913->5914 5915 40765c 5913->5915 5914->5912 5914->5915 5916 40748c 35 API calls 5915->5916 5916->5912 6811 40712e 6812 407118 6811->6812 6813 403198 4 API calls 6812->6813 6814 407120 6813->6814 6815 403198 4 API calls 6814->6815 6816 407128 6815->6816 5931 40a82f 5932 409ae8 18 API calls 5931->5932 5933 40a834 5932->5933 5934 40a839 5933->5934 5935 402f24 5 API calls 5933->5935 5968 40993c 5934->5968 5935->5934 5937 40a891 5973 4026c4 GetSystemTime 5937->5973 5939 40a83e 5939->5937 6034 408dd8 5939->6034 5940 40a896 5974 409330 5940->5974 5944 40a86d 5948 40a875 MessageBoxA 5944->5948 5945 4031e8 18 API calls 5946 40a8ab 5945->5946 5992 406928 5946->5992 5948->5937 5950 40a882 5948->5950 6037 405864 5950->6037 5955 40a8d9 6019 403340 5955->6019 5957 40a8e7 5958 4031e8 18 API calls 5957->5958 5959 40a8f7 5958->5959 5960 4074e0 37 API calls 5959->5960 5961 40a936 5960->5961 5962 402594 18 API calls 5961->5962 5963 40a956 5962->5963 5964 407a28 19 API calls 5963->5964 5965 40a998 5964->5965 5966 407cb8 35 API calls 5965->5966 5967 40a9bf 5966->5967 6041 40953c 5968->6041 5971 4098cc 19 API calls 5972 40995c 5971->5972 5972->5939 5973->5940 5977 409350 5974->5977 5978 409375 CreateDirectoryA 5977->5978 5982 408dd8 18 API calls 5977->5982 5984 404c94 33 API calls 5977->5984 5987 407284 19 API calls 5977->5987 5990 408da8 18 API calls 5977->5990 5991 405890 18 API calls 5977->5991 6097 406cf4 5977->6097 6120 409224 5977->6120 5979 4093ed 5978->5979 5980 40937f GetLastError 5978->5980 5981 40322c 4 API calls 5979->5981 5980->5977 5983 4093f7 5981->5983 5982->5977 5985 4031b8 4 API calls 5983->5985 5984->5977 5986 409411 5985->5986 5988 4031b8 4 API calls 5986->5988 5987->5977 5989 40941e 5988->5989 5989->5945 5990->5977 5991->5977 6226 406820 5992->6226 5995 403454 18 API calls 5996 40694a 5995->5996 5997 4066c0 5996->5997 6231 4068e4 5997->6231 6000 4066f0 6003 403340 18 API calls 6000->6003 6001 4066fe 6002 403454 18 API calls 6001->6002 6005 406711 6002->6005 6004 4066fc 6003->6004 6007 403198 4 API calls 6004->6007 6006 403340 18 API calls 6005->6006 6006->6004 6008 406733 6007->6008 6009 406638 6008->6009 6010 406642 6009->6010 6011 406665 6009->6011 6237 406950 6010->6237 6013 40322c 4 API calls 6011->6013 6014 40666e 6013->6014 6014->5955 6015 406649 6015->6011 6016 406654 6015->6016 6017 403340 18 API calls 6016->6017 6018 406662 6017->6018 6018->5955 6020 403344 6019->6020 6021 4033a5 6019->6021 6022 4031e8 6020->6022 6023 40334c 6020->6023 6028 403254 18 API calls 6022->6028 6029 4031fc 6022->6029 6023->6021 6025 40335b 6023->6025 6026 4031e8 18 API calls 6023->6026 6024 403228 6024->5957 6027 403254 18 API calls 6025->6027 6026->6025 6031 403375 6027->6031 6028->6029 6029->6024 6030 4025ac 4 API calls 6029->6030 6030->6024 6032 4031e8 18 API calls 6031->6032 6033 4033a1 6032->6033 6033->5957 6035 408da8 18 API calls 6034->6035 6036 408df4 6035->6036 6036->5944 6038 405869 6037->6038 6039 405940 19 API calls 6038->6039 6040 40587b 6039->6040 6040->6040 6047 40955b 6041->6047 6042 409590 6044 40959d GetUserDefaultLangID 6042->6044 6049 409592 6042->6049 6043 409594 6053 407024 GetModuleHandleA GetProcAddress 6043->6053 6044->6049 6047->6042 6047->6043 6048 40956f 6047->6048 6048->5971 6049->6048 6050 4095cb GetACP 6049->6050 6051 4095ef 6049->6051 6050->6048 6050->6049 6051->6048 6052 409615 GetACP 6051->6052 6052->6048 6052->6051 6054 407067 6053->6054 6055 40705e 6053->6055 6056 407070 6054->6056 6057 4070a8 6054->6057 6064 403198 4 API calls 6055->6064 6074 406f68 6056->6074 6058 406f68 RegOpenKeyExA 6057->6058 6062 4070c1 6058->6062 6060 407089 6061 4070de 6060->6061 6077 406f5c 6060->6077 6066 40322c 4 API calls 6061->6066 6062->6061 6065 406f5c 20 API calls 6062->6065 6068 407120 6064->6068 6069 4070d5 RegCloseKey 6065->6069 6070 4070eb 6066->6070 6071 403198 4 API calls 6068->6071 6069->6061 6072 4032fc 18 API calls 6070->6072 6073 407128 6071->6073 6072->6055 6073->6049 6075 406f73 6074->6075 6076 406f79 RegOpenKeyExA 6074->6076 6075->6076 6076->6060 6080 406e10 6077->6080 6081 406e36 RegQueryValueExA 6080->6081 6082 406e7b 6081->6082 6088 406e59 6081->6088 6084 403198 4 API calls 6082->6084 6083 406e73 6085 403198 4 API calls 6083->6085 6086 406f47 RegCloseKey 6084->6086 6085->6082 6086->6061 6087 403278 18 API calls 6087->6088 6088->6082 6088->6083 6088->6087 6089 403420 18 API calls 6088->6089 6090 406eb0 RegQueryValueExA 6089->6090 6090->6081 6091 406ecc 6090->6091 6091->6082 6092 4034f0 18 API calls 6091->6092 6093 406f0e 6092->6093 6094 406f20 6093->6094 6096 403420 18 API calls 6093->6096 6095 4031e8 18 API calls 6094->6095 6095->6082 6096->6094 6139 406a58 6097->6139 6100 406d26 6102 406a58 19 API calls 6100->6102 6104 406d72 6100->6104 6103 406d36 6102->6103 6105 406d42 6103->6105 6108 406a34 21 API calls 6103->6108 6147 406888 6104->6147 6105->6104 6106 406d67 6105->6106 6109 406a58 19 API calls 6105->6109 6106->6104 6159 406cc8 GetWindowsDirectoryA 6106->6159 6108->6105 6112 406d5b 6109->6112 6112->6106 6115 406a34 21 API calls 6112->6115 6113 406638 19 API calls 6114 406d87 6113->6114 6116 40322c 4 API calls 6114->6116 6115->6106 6117 406d91 6116->6117 6118 4031b8 4 API calls 6117->6118 6119 406dab 6118->6119 6119->5977 6121 409244 6120->6121 6122 406638 19 API calls 6121->6122 6123 40925d 6122->6123 6124 40322c 4 API calls 6123->6124 6131 409268 6124->6131 6125 406978 20 API calls 6125->6131 6127 408dd8 18 API calls 6127->6131 6128 4033b4 18 API calls 6128->6131 6130 405890 18 API calls 6130->6131 6131->6125 6131->6127 6131->6128 6131->6130 6132 4092e4 6131->6132 6199 4091b0 6131->6199 6207 409034 6131->6207 6133 40322c 4 API calls 6132->6133 6134 4092ef 6133->6134 6135 4031b8 4 API calls 6134->6135 6136 409309 6135->6136 6137 403198 4 API calls 6136->6137 6138 409311 6137->6138 6138->5977 6140 4034f0 18 API calls 6139->6140 6141 406a6b 6140->6141 6142 406a82 GetEnvironmentVariableA 6141->6142 6146 406a95 6141->6146 6161 406dec 6141->6161 6142->6141 6143 406a8e 6142->6143 6144 403198 4 API calls 6143->6144 6144->6146 6146->6100 6156 406a34 6146->6156 6148 403414 6147->6148 6149 4068ab GetFullPathNameA 6148->6149 6150 4068b7 6149->6150 6151 4068ce 6149->6151 6150->6151 6152 4068bf 6150->6152 6153 40322c 4 API calls 6151->6153 6154 403278 18 API calls 6152->6154 6155 4068cc 6153->6155 6154->6155 6155->6113 6165 4069dc 6156->6165 6160 406ce9 6159->6160 6160->6104 6162 406dfa 6161->6162 6163 4034f0 18 API calls 6162->6163 6164 406e08 6163->6164 6164->6141 6172 406978 6165->6172 6167 4069fe 6168 406a06 GetFileAttributesA 6167->6168 6169 406a1b 6168->6169 6170 403198 4 API calls 6169->6170 6171 406a23 6170->6171 6171->6100 6182 406744 6172->6182 6174 4069b0 6177 4069c6 6174->6177 6178 4069bb 6174->6178 6176 406989 6176->6174 6189 406970 CharPrevA 6176->6189 6190 403454 6177->6190 6179 40322c 4 API calls 6178->6179 6181 4069c4 6179->6181 6181->6167 6183 406755 6182->6183 6184 4067b9 6183->6184 6188 406773 6183->6188 6185 406680 IsDBCSLeadByte 6184->6185 6186 4067b4 6184->6186 6185->6186 6186->6176 6188->6186 6197 406680 IsDBCSLeadByte 6188->6197 6189->6176 6191 403486 6190->6191 6192 403459 6190->6192 6193 403198 4 API calls 6191->6193 6192->6191 6195 40346d 6192->6195 6194 40347c 6193->6194 6194->6181 6196 403278 18 API calls 6195->6196 6196->6194 6198 406694 6197->6198 6198->6188 6200 403198 4 API calls 6199->6200 6202 4091d1 6200->6202 6204 4091fe 6202->6204 6216 4032a8 6202->6216 6219 403494 6202->6219 6205 403198 4 API calls 6204->6205 6206 409213 6205->6206 6206->6131 6208 408f70 2 API calls 6207->6208 6209 40904a 6208->6209 6210 40904e 6209->6210 6223 406a48 6209->6223 6210->6131 6213 409081 6214 408fac Wow64RevertWow64FsRedirection 6213->6214 6215 409089 6214->6215 6215->6131 6217 403278 18 API calls 6216->6217 6218 4032b5 6217->6218 6218->6202 6220 403498 6219->6220 6222 4034c3 6219->6222 6221 4034f0 18 API calls 6220->6221 6221->6222 6222->6202 6224 4069dc 21 API calls 6223->6224 6225 406a52 GetLastError 6224->6225 6225->6213 6227 406744 IsDBCSLeadByte 6226->6227 6229 406835 6227->6229 6228 40687f 6228->5995 6229->6228 6230 406680 IsDBCSLeadByte 6229->6230 6230->6229 6232 4068f3 6231->6232 6233 406820 IsDBCSLeadByte 6232->6233 6236 4068fe 6233->6236 6234 4066ea 6234->6000 6234->6001 6235 406680 IsDBCSLeadByte 6235->6236 6236->6234 6236->6235 6238 406957 6237->6238 6239 40695b 6237->6239 6238->6015 6242 406970 CharPrevA 6239->6242 6241 40696c 6241->6015 6242->6241 6817 408f30 6820 408dfc 6817->6820 6821 408e05 6820->6821 6822 403198 4 API calls 6821->6822 6823 408e13 6821->6823 6822->6821 6824 403932 6825 403924 6824->6825 6826 40374c VariantClear 6825->6826 6827 40392c 6826->6827 5387 4075c4 SetFilePointer 5388 4075f7 5387->5388 5389 4075e7 GetLastError 5387->5389 5389->5388 5390 4075f0 5389->5390 5392 40748c GetLastError 5390->5392 5395 4073ec 5392->5395 5396 407284 19 API calls 5395->5396 5398 407414 5396->5398 5397 407434 5400 405890 18 API calls 5397->5400 5398->5397 5399 405194 33 API calls 5398->5399 5399->5397 5401 407443 5400->5401 5402 403198 4 API calls 5401->5402 5403 407460 5402->5403 5403->5388 6418 4076c8 WriteFile 6419 4076e8 6418->6419 6420 4076ef 6418->6420 6421 40748c 35 API calls 6419->6421 6422 407700 6420->6422 6423 4073ec 34 API calls 6420->6423 6421->6420 6423->6422 6424 402ccc 6427 402cfe 6424->6427 6428 402cdd 6424->6428 6425 402d88 RtlUnwind 6426 403154 4 API calls 6425->6426 6426->6427 6428->6425 6428->6427 6429 402b28 RaiseException 6428->6429 6430 402d7f 6429->6430 6430->6425 6836 403fcd 6837 403f07 4 API calls 6836->6837 6838 403fd6 6837->6838 6839 403e9c 4 API calls 6838->6839 6840 403fe2 6839->6840 6437 4024d0 6438 4024e4 6437->6438 6439 4024e9 6437->6439 6442 401918 4 API calls 6438->6442 6440 402518 6439->6440 6441 40250e RtlEnterCriticalSection 6439->6441 6444 4024ed 6439->6444 6452 402300 6440->6452 6441->6440 6442->6439 6445 402525 6448 402581 6445->6448 6449 402577 RtlLeaveCriticalSection 6445->6449 6447 401fd4 14 API calls 6450 402531 6447->6450 6449->6448 6450->6445 6451 40215c 9 API calls 6450->6451 6451->6445 6453 402314 6452->6453 6455 4023b8 6453->6455 6456 402335 6453->6456 6454 402344 6454->6445 6454->6447 6455->6454 6457 401d80 9 API calls 6455->6457 6460 402455 6455->6460 6462 401e84 6455->6462 6456->6454 6458 401b74 9 API calls 6456->6458 6457->6455 6458->6454 6460->6454 6461 401d00 9 API calls 6460->6461 6461->6454 6467 401768 6462->6467 6464 401e99 6465 401ea6 6464->6465 6466 401dcc 9 API calls 6464->6466 6465->6455 6466->6465 6469 401787 6467->6469 6468 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 6468->6469 6469->6468 6470 40183b 6469->6470 6471 40132c LocalAlloc 6469->6471 6473 401821 6469->6473 6475 4017d6 6469->6475 6472 4015c4 VirtualAlloc 6470->6472 6476 4017e7 6470->6476 6471->6469 6472->6476 6474 40150c VirtualFree 6473->6474 6474->6476 6477 40150c VirtualFree 6475->6477 6476->6464 6477->6476 6478 4028d2 6479 4028da 6478->6479 6480 403554 4 API calls 6479->6480 6481 4028ef 6479->6481 6480->6479 6482 4025ac 4 API calls 6481->6482 6483 4028f4 6482->6483 6841 4019d3 6842 4019ba 6841->6842 6843 4019c3 RtlLeaveCriticalSection 6842->6843 6844 4019cd 6842->6844 6843->6844 5404 407fd4 5405 407fe6 5404->5405 5407 407fed 5404->5407 5415 407f10 5405->5415 5408 408021 5407->5408 5409 408015 5407->5409 5410 408017 5407->5410 5411 40804e 5408->5411 5413 407d7c 33 API calls 5408->5413 5429 407e2c 5409->5429 5426 407d7c 5410->5426 5413->5411 5416 407f25 5415->5416 5417 407d7c 33 API calls 5416->5417 5418 407f34 5416->5418 5417->5418 5419 407f6e 5418->5419 5420 407d7c 33 API calls 5418->5420 5421 407f82 5419->5421 5422 407d7c 33 API calls 5419->5422 5420->5419 5425 407fae 5421->5425 5436 407eb8 5421->5436 5422->5421 5425->5407 5439 4058c4 5426->5439 5428 407d9e 5428->5408 5430 405194 33 API calls 5429->5430 5431 407e57 5430->5431 5447 407de4 5431->5447 5433 407e5f 5434 403198 4 API calls 5433->5434 5435 407e74 5434->5435 5435->5408 5437 407ec7 VirtualFree 5436->5437 5438 407ed9 VirtualAlloc 5436->5438 5437->5438 5438->5425 5441 4058d0 5439->5441 5440 405194 33 API calls 5442 4058fd 5440->5442 5441->5440 5443 4031e8 18 API calls 5442->5443 5444 405908 5443->5444 5445 403198 4 API calls 5444->5445 5446 40591d 5445->5446 5446->5428 5448 4058c4 33 API calls 5447->5448 5449 407e06 5448->5449 5449->5433 6484 405ad4 6485 405ae4 6484->6485 6486 405adc 6484->6486 6487 405ae2 6486->6487 6488 405aeb 6486->6488 6491 405a4c 6487->6491 6489 405940 19 API calls 6488->6489 6489->6485 6492 405a54 6491->6492 6493 405a6e 6492->6493 6494 403154 4 API calls 6492->6494 6495 405a73 6493->6495 6496 405a8a 6493->6496 6494->6492 6497 405940 19 API calls 6495->6497 6498 403154 4 API calls 6496->6498 6499 405a86 6497->6499 6500 405a8f 6498->6500 6502 403154 4 API calls 6499->6502 6501 4059b0 33 API calls 6500->6501 6501->6499 6503 405ab8 6502->6503 6504 403154 4 API calls 6503->6504 6505 405ac6 6504->6505 6505->6485 5917 40a9de 5918 40aa03 5917->5918 5919 407918 InterlockedExchange 5918->5919 5920 40aa2d 5919->5920 5921 40aa3d 5920->5921 5922 409ae8 18 API calls 5920->5922 5927 4076ac SetEndOfFile 5921->5927 5922->5921 5924 40aa59 5925 4025ac 4 API calls 5924->5925 5926 40aa90 5925->5926 5928 4076c3 5927->5928 5929 4076bc 5927->5929 5928->5924 5930 40748c 35 API calls 5929->5930 5930->5928 6848 402be9 RaiseException 6849 402c04 6848->6849 6516 402af2 6517 402afe 6516->6517 6520 402ed0 6517->6520 6521 403154 4 API calls 6520->6521 6523 402ee0 6521->6523 6522 402b03 6523->6522 6525 402b0c 6523->6525 6526 402b25 6525->6526 6527 402b15 RaiseException 6525->6527 6526->6522 6527->6526 5455 40a5f8 5498 4030dc 5455->5498 5457 40a60e 5501 4042e8 5457->5501 5459 40a613 5504 40457c GetModuleHandleA GetProcAddress 5459->5504 5463 40a61d 5512 4065c8 5463->5512 5465 40a622 5521 4090a4 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 5465->5521 5472 40a665 5543 406c2c 5472->5543 5476 4031e8 18 API calls 5477 40a683 5476->5477 5557 4074e0 5477->5557 5482 407918 InterlockedExchange 5485 40a6d2 5482->5485 5484 40a710 5577 4074a0 5484->5577 5485->5484 5614 409ae8 5485->5614 5487 40a751 5581 407a28 5487->5581 5488 40a736 5488->5487 5489 409ae8 18 API calls 5488->5489 5489->5487 5491 40a776 5591 408b08 5491->5591 5495 40a7bc 5496 408b08 35 API calls 5495->5496 5497 40a7f5 5495->5497 5496->5495 5624 403094 5498->5624 5500 4030e1 GetModuleHandleA GetCommandLineA 5500->5457 5502 403154 4 API calls 5501->5502 5503 404323 5501->5503 5502->5503 5503->5459 5505 404598 5504->5505 5506 40459f GetProcAddress 5504->5506 5505->5506 5507 4045b5 GetProcAddress 5506->5507 5508 4045ae 5506->5508 5509 4045c4 SetProcessDEPPolicy 5507->5509 5510 4045c8 5507->5510 5508->5507 5509->5510 5511 404624 6F541CD0 5510->5511 5511->5463 5625 405ca8 5512->5625 5522 4090f7 5521->5522 5709 406fa0 SetErrorMode 5522->5709 5525 407284 19 API calls 5526 409127 5525->5526 5527 403198 4 API calls 5526->5527 5528 40913c 5527->5528 5529 409b78 GetSystemInfo VirtualQuery 5528->5529 5530 409ba2 5529->5530 5531 409c2c 5529->5531 5530->5531 5532 409c0d VirtualQuery 5530->5532 5533 409bcc VirtualProtect 5530->5533 5534 409bfb VirtualProtect 5530->5534 5535 409768 5531->5535 5532->5530 5532->5531 5533->5530 5534->5532 5715 406bd0 GetCommandLineA 5535->5715 5537 409850 5538 4031b8 4 API calls 5537->5538 5540 40986a 5538->5540 5539 406c2c 20 API calls 5541 409785 5539->5541 5540->5472 5607 409c88 5540->5607 5541->5537 5541->5539 5542 403454 18 API calls 5541->5542 5542->5541 5544 406c53 GetModuleFileNameA 5543->5544 5545 406c77 GetCommandLineA 5543->5545 5546 403278 18 API calls 5544->5546 5553 406c7c 5545->5553 5547 406c75 5546->5547 5551 406ca4 5547->5551 5548 406c81 5549 403198 4 API calls 5548->5549 5552 406c89 5549->5552 5550 406af0 18 API calls 5550->5553 5554 403198 4 API calls 5551->5554 5555 40322c 4 API calls 5552->5555 5553->5548 5553->5550 5553->5552 5556 406cb9 5554->5556 5555->5551 5556->5476 5558 4074ea 5557->5558 5722 407576 5558->5722 5725 407578 5558->5725 5559 407516 5560 40752a 5559->5560 5561 40748c 35 API calls 5559->5561 5564 409c34 FindResourceA 5560->5564 5561->5560 5565 409c49 5564->5565 5566 409c4e SizeofResource 5564->5566 5567 409ae8 18 API calls 5565->5567 5568 409c60 LoadResource 5566->5568 5569 409c5b 5566->5569 5567->5566 5571 409c73 LockResource 5568->5571 5572 409c6e 5568->5572 5570 409ae8 18 API calls 5569->5570 5570->5568 5574 409c84 5571->5574 5575 409c7f 5571->5575 5573 409ae8 18 API calls 5572->5573 5573->5571 5574->5482 5574->5485 5576 409ae8 18 API calls 5575->5576 5576->5574 5578 4074b4 5577->5578 5579 4074c4 5578->5579 5580 4073ec 34 API calls 5578->5580 5579->5488 5580->5579 5582 407a35 5581->5582 5583 405890 18 API calls 5582->5583 5584 407a89 5582->5584 5583->5584 5585 407918 InterlockedExchange 5584->5585 5586 407a9b 5585->5586 5587 405890 18 API calls 5586->5587 5588 407ab1 5586->5588 5587->5588 5589 407af4 5588->5589 5590 405890 18 API calls 5588->5590 5589->5491 5590->5589 5593 408b39 5591->5593 5598 408b82 5591->5598 5592 408bcd 5728 407cb8 5592->5728 5596 4034f0 18 API calls 5593->5596 5593->5598 5601 403420 18 API calls 5593->5601 5602 4031e8 18 API calls 5593->5602 5606 407cb8 35 API calls 5593->5606 5595 407cb8 35 API calls 5595->5598 5596->5593 5597 408be4 5600 4031b8 4 API calls 5597->5600 5598->5592 5598->5595 5599 4034f0 18 API calls 5598->5599 5604 403420 18 API calls 5598->5604 5605 4031e8 18 API calls 5598->5605 5599->5598 5603 408bfe 5600->5603 5601->5593 5602->5593 5621 404c20 5603->5621 5604->5598 5605->5598 5606->5593 5608 40322c 4 API calls 5607->5608 5609 409cab 5608->5609 5610 409cba MessageBoxA 5609->5610 5611 409ccf 5610->5611 5612 403198 4 API calls 5611->5612 5613 409cd7 5612->5613 5613->5472 5615 409af1 5614->5615 5616 409b09 5614->5616 5618 405890 18 API calls 5615->5618 5617 405890 18 API calls 5616->5617 5619 409b1a 5617->5619 5620 409b03 5618->5620 5619->5484 5620->5484 5750 402594 5621->5750 5623 404c2b 5623->5495 5624->5500 5626 405940 19 API calls 5625->5626 5627 405cb9 5626->5627 5628 405280 GetSystemDefaultLCID 5627->5628 5632 4052b6 5628->5632 5629 404cdc 19 API calls 5629->5632 5630 40520c 19 API calls 5630->5632 5631 4031e8 18 API calls 5631->5632 5632->5629 5632->5630 5632->5631 5636 405318 5632->5636 5633 404cdc 19 API calls 5633->5636 5634 40520c 19 API calls 5634->5636 5635 4031e8 18 API calls 5635->5636 5636->5633 5636->5634 5636->5635 5637 40539b 5636->5637 5638 4031b8 4 API calls 5637->5638 5639 4053b5 5638->5639 5640 4053c4 GetSystemDefaultLCID 5639->5640 5697 40520c GetLocaleInfoA 5640->5697 5643 4031e8 18 API calls 5644 405404 5643->5644 5645 40520c 19 API calls 5644->5645 5646 405419 5645->5646 5647 40520c 19 API calls 5646->5647 5648 40543d 5647->5648 5703 405258 GetLocaleInfoA 5648->5703 5651 405258 GetLocaleInfoA 5652 40546d 5651->5652 5653 40520c 19 API calls 5652->5653 5654 405487 5653->5654 5655 405258 GetLocaleInfoA 5654->5655 5656 4054a4 5655->5656 5657 40520c 19 API calls 5656->5657 5658 4054be 5657->5658 5659 4031e8 18 API calls 5658->5659 5660 4054cb 5659->5660 5661 40520c 19 API calls 5660->5661 5662 4054e0 5661->5662 5663 4031e8 18 API calls 5662->5663 5664 4054ed 5663->5664 5665 405258 GetLocaleInfoA 5664->5665 5666 4054fb 5665->5666 5667 40520c 19 API calls 5666->5667 5668 405515 5667->5668 5669 4031e8 18 API calls 5668->5669 5670 405522 5669->5670 5671 40520c 19 API calls 5670->5671 5672 405537 5671->5672 5673 4031e8 18 API calls 5672->5673 5674 405544 5673->5674 5675 40520c 19 API calls 5674->5675 5676 405559 5675->5676 5677 405576 5676->5677 5678 405567 5676->5678 5680 40322c 4 API calls 5677->5680 5705 40322c 5678->5705 5681 405574 5680->5681 5682 40520c 19 API calls 5681->5682 5683 405598 5682->5683 5684 4055b5 5683->5684 5685 4055a6 5683->5685 5687 403198 4 API calls 5684->5687 5686 40322c 4 API calls 5685->5686 5688 4055b3 5686->5688 5687->5688 5689 4033b4 18 API calls 5688->5689 5690 4055d7 5689->5690 5691 4033b4 18 API calls 5690->5691 5692 4055f1 5691->5692 5693 4031b8 4 API calls 5692->5693 5694 40560b 5693->5694 5695 405cf4 GetVersionExA 5694->5695 5696 405d0b 5695->5696 5696->5465 5698 405233 5697->5698 5699 405245 5697->5699 5700 403278 18 API calls 5698->5700 5701 40322c 4 API calls 5699->5701 5702 405243 5700->5702 5701->5702 5702->5643 5704 405274 5703->5704 5704->5651 5707 403230 5705->5707 5706 403252 5706->5681 5707->5706 5708 4025ac 4 API calls 5707->5708 5708->5706 5713 403414 5709->5713 5712 406fee 5712->5525 5714 403418 LoadLibraryA 5713->5714 5714->5712 5716 406af0 18 API calls 5715->5716 5718 406bf3 5716->5718 5717 406c05 5720 403198 4 API calls 5717->5720 5718->5717 5719 406af0 18 API calls 5718->5719 5719->5718 5721 406c1a 5720->5721 5721->5541 5723 407578 5722->5723 5724 4075b7 CreateFileA 5723->5724 5724->5559 5726 403414 5725->5726 5727 4075b7 CreateFileA 5726->5727 5727->5559 5729 407cd3 5728->5729 5733 407cc8 5728->5733 5734 407c5c 5729->5734 5732 405890 18 API calls 5732->5733 5733->5597 5735 407c70 5734->5735 5736 407caf 5734->5736 5735->5736 5738 407bac 5735->5738 5736->5732 5736->5733 5739 407bb7 5738->5739 5740 407bc8 5738->5740 5741 405890 18 API calls 5739->5741 5742 4074a0 34 API calls 5740->5742 5741->5740 5743 407bdc 5742->5743 5744 4074a0 34 API calls 5743->5744 5745 407bfd 5744->5745 5746 407918 InterlockedExchange 5745->5746 5747 407c12 5746->5747 5748 407c28 5747->5748 5749 405890 18 API calls 5747->5749 5748->5735 5749->5748 5751 402598 5750->5751 5753 4025a2 5750->5753 5756 401fd4 5751->5756 5752 40259e 5752->5753 5754 403154 4 API calls 5752->5754 5753->5623 5753->5753 5754->5753 5757 401fe8 5756->5757 5758 401fed 5756->5758 5767 401918 RtlInitializeCriticalSection 5757->5767 5760 402012 RtlEnterCriticalSection 5758->5760 5761 40201c 5758->5761 5764 401ff1 5758->5764 5760->5761 5761->5764 5774 401ee0 5761->5774 5764->5752 5765 402147 5765->5752 5766 40213d RtlLeaveCriticalSection 5766->5765 5768 401946 5767->5768 5769 40193c RtlEnterCriticalSection 5767->5769 5770 401964 LocalAlloc 5768->5770 5769->5768 5771 40197e 5770->5771 5772 4019c3 RtlLeaveCriticalSection 5771->5772 5773 4019cd 5771->5773 5772->5773 5773->5758 5777 401ef0 5774->5777 5775 401f1c 5779 401f40 5775->5779 5785 401d00 5775->5785 5777->5775 5777->5779 5780 401e58 5777->5780 5779->5765 5779->5766 5789 4016d8 5780->5789 5784 401e75 5784->5777 5786 401d4e 5785->5786 5787 401d1e 5785->5787 5786->5787 5858 401c68 5786->5858 5787->5779 5793 4016f4 5789->5793 5791 4016fe 5814 4015c4 5791->5814 5793->5791 5795 40174f 5793->5795 5798 40175b 5793->5798 5806 401430 5793->5806 5818 40132c 5793->5818 5822 40150c 5795->5822 5796 40170a 5796->5798 5798->5784 5799 401dcc 5798->5799 5832 401d80 5799->5832 5802 40132c LocalAlloc 5804 401df0 5802->5804 5803 401df8 5803->5784 5804->5803 5836 401b44 5804->5836 5807 40143f VirtualAlloc 5806->5807 5809 40146c 5807->5809 5810 40148f 5807->5810 5826 4012e4 5809->5826 5810->5793 5813 40147c VirtualFree 5813->5810 5816 40160a 5814->5816 5815 40163a 5815->5796 5816->5815 5817 401626 VirtualAlloc 5816->5817 5817->5815 5817->5816 5819 401348 5818->5819 5820 4012e4 LocalAlloc 5819->5820 5821 40138f 5820->5821 5821->5793 5825 40153b 5822->5825 5823 401594 5823->5798 5824 401568 VirtualFree 5824->5825 5825->5823 5825->5824 5829 40128c 5826->5829 5830 401298 LocalAlloc 5829->5830 5831 4012aa 5829->5831 5830->5831 5831->5810 5831->5813 5833 401d92 5832->5833 5834 401d89 5832->5834 5833->5802 5834->5833 5841 401b74 5834->5841 5837 401b61 5836->5837 5838 401b52 5836->5838 5837->5803 5839 401d00 9 API calls 5838->5839 5840 401b5f 5839->5840 5840->5803 5844 40215c 5841->5844 5843 401b95 5843->5833 5845 40217a 5844->5845 5846 402175 5844->5846 5848 4021ab RtlEnterCriticalSection 5845->5848 5850 4021b5 5845->5850 5852 40217e 5845->5852 5847 401918 4 API calls 5846->5847 5847->5845 5848->5850 5849 4021c1 5853 4022e3 RtlLeaveCriticalSection 5849->5853 5854 4022ed 5849->5854 5850->5849 5851 402244 5850->5851 5856 402270 5850->5856 5851->5852 5855 401d80 7 API calls 5851->5855 5852->5843 5853->5854 5854->5843 5855->5852 5856->5849 5857 401d00 7 API calls 5856->5857 5857->5849 5859 401c7a 5858->5859 5860 401c9d 5859->5860 5861 401caf 5859->5861 5871 40188c 5860->5871 5863 40188c 3 API calls 5861->5863 5864 401cad 5863->5864 5865 401b44 9 API calls 5864->5865 5870 401cc5 5864->5870 5866 401cd4 5865->5866 5867 401cee 5866->5867 5881 401b98 5866->5881 5886 4013a0 5867->5886 5870->5787 5872 4018b2 5871->5872 5880 40190b 5871->5880 5890 401658 5872->5890 5875 40132c LocalAlloc 5876 4018cf 5875->5876 5877 4018e6 5876->5877 5878 40150c VirtualFree 5876->5878 5879 4013a0 LocalAlloc 5877->5879 5877->5880 5878->5877 5879->5880 5880->5864 5882 401b9d 5881->5882 5883 401bab 5881->5883 5884 401b74 9 API calls 5882->5884 5883->5867 5885 401baa 5884->5885 5885->5867 5887 4013ab 5886->5887 5888 4013c6 5887->5888 5889 4012e4 LocalAlloc 5887->5889 5888->5870 5889->5888 5892 40168f 5890->5892 5891 4016cf 5891->5875 5892->5891 5893 4016a9 VirtualFree 5892->5893 5893->5892 6850 402dfa 6851 402e26 6850->6851 6852 402e0d 6850->6852 6854 402ba4 6852->6854 6855 402bc9 6854->6855 6856 402bad 6854->6856 6855->6851 6857 402bb5 RaiseException 6856->6857 6857->6855 6858 4075fa GetFileSize 6859 407626 6858->6859 6860 407616 GetLastError 6858->6860 6860->6859 6861 40761f 6860->6861 6862 40748c 35 API calls 6861->6862 6862->6859 6863 406ffb 6864 407008 SetErrorMode 6863->6864 6532 403a80 CloseHandle 6533 403a90 6532->6533 6534 403a91 GetLastError 6532->6534 6535 404283 6536 4042c3 6535->6536 6537 403154 4 API calls 6536->6537 6538 404323 6537->6538 6865 404185 6866 4041ff 6865->6866 6867 403154 4 API calls 6866->6867 6868 4041cc 6866->6868 6869 404323 6867->6869 6539 403e87 6541 403e4c 6539->6541 6540 403e67 6546 403e78 6540->6546 6552 402674 6540->6552 6541->6540 6542 403e62 6541->6542 6543 403e7b 6541->6543 6548 403cc8 6542->6548 6544 402674 4 API calls 6543->6544 6544->6546 6549 403cd6 6548->6549 6550 402674 4 API calls 6549->6550 6551 403ceb 6549->6551 6550->6551 6551->6540 6553 403154 4 API calls 6552->6553 6554 40267a 6553->6554 6554->6546 6563 407e90 6564 407eb8 VirtualFree 6563->6564 6565 407e9d 6564->6565 6568 403e95 6569 403e4c 6568->6569 6570 403e62 6569->6570 6571 403e7b 6569->6571 6572 403e67 6569->6572 6574 403cc8 4 API calls 6570->6574 6573 402674 4 API calls 6571->6573 6575 403e78 6572->6575 6576 402674 4 API calls 6572->6576 6573->6575 6574->6572 6576->6575 6577 40ac97 6586 4096fc 6577->6586 6580 402f24 5 API calls 6581 40aca1 6580->6581 6582 403198 4 API calls 6581->6582 6583 40acc0 6582->6583 6584 403198 4 API calls 6583->6584 6585 40acc8 6584->6585 6595 4056ac 6586->6595 6588 409745 6592 403198 4 API calls 6588->6592 6589 409717 6589->6588 6601 40720c 6589->6601 6591 409735 6594 40973d MessageBoxA 6591->6594 6593 40975a 6592->6593 6593->6580 6593->6581 6594->6588 6596 403154 4 API calls 6595->6596 6597 4056b1 6596->6597 6598 4056c9 6597->6598 6599 403154 4 API calls 6597->6599 6598->6589 6600 4056bf 6599->6600 6600->6589 6602 4056ac 4 API calls 6601->6602 6603 40721b 6602->6603 6604 407221 6603->6604 6605 40722f 6603->6605 6606 40322c 4 API calls 6604->6606 6608 40724b 6605->6608 6609 40723f 6605->6609 6607 40722d 6606->6607 6607->6591 6619 4032b8 6608->6619 6612 4071d0 6609->6612 6613 40322c 4 API calls 6612->6613 6614 4071df 6613->6614 6615 4071fc 6614->6615 6616 406950 CharPrevA 6614->6616 6615->6607 6617 4071eb 6616->6617 6617->6615 6618 4032fc 18 API calls 6617->6618 6618->6615 6620 403278 18 API calls 6619->6620 6621 4032c2 6620->6621 6621->6607 6622 403a97 6623 403aac 6622->6623 6624 403bbc GetStdHandle 6623->6624 6625 403b0e CreateFileA 6623->6625 6631 403ab2 6623->6631 6626 403c17 GetLastError 6624->6626 6639 403bba 6624->6639 6625->6626 6627 403b2c 6625->6627 6626->6631 6629 403b3b GetFileSize 6627->6629 6627->6639 6629->6626 6632 403b4e SetFilePointer 6629->6632 6630 403be7 GetFileType 6630->6631 6634 403c02 CloseHandle 6630->6634 6632->6626 6635 403b6a ReadFile 6632->6635 6634->6631 6635->6626 6636 403b8c 6635->6636 6637 403b9f SetFilePointer 6636->6637 6636->6639 6637->6626 6638 403bb0 SetEndOfFile 6637->6638 6638->6626 6638->6639 6639->6630 6639->6631 6644 40aaa2 6645 40aad2 6644->6645 6646 40aadc CreateWindowExA SetWindowLongA 6645->6646 6647 405194 33 API calls 6646->6647 6648 40ab5f 6647->6648 6649 4032fc 18 API calls 6648->6649 6650 40ab6d 6649->6650 6651 4032fc 18 API calls 6650->6651 6652 40ab7a 6651->6652 6653 406b7c 19 API calls 6652->6653 6654 40ab86 6653->6654 6655 4032fc 18 API calls 6654->6655 6656 40ab8f 6655->6656 6657 4099ec 43 API calls 6656->6657 6658 40aba1 6657->6658 6659 4098cc 19 API calls 6658->6659 6660 40abb4 6658->6660 6659->6660 6661 40abed 6660->6661 6662 4094d8 9 API calls 6660->6662 6663 40ac06 6661->6663 6666 40ac00 RemoveDirectoryA 6661->6666 6662->6661 6664 40ac1a 6663->6664 6665 40ac0f DestroyWindow 6663->6665 6667 40ac42 6664->6667 6668 40357c 4 API calls 6664->6668 6665->6664 6666->6663 6669 40ac38 6668->6669 6670 4025ac 4 API calls 6669->6670 6670->6667 6882 405ba2 6884 405ba4 6882->6884 6883 405be0 6887 405940 19 API calls 6883->6887 6884->6883 6885 405bf7 6884->6885 6886 405bda 6884->6886 6890 404cdc 19 API calls 6885->6890 6886->6883 6888 405c4c 6886->6888 6891 405bf3 6887->6891 6889 4059b0 33 API calls 6888->6889 6889->6891 6893 405c20 6890->6893 6892 403198 4 API calls 6891->6892 6894 405c86 6892->6894 6895 4059b0 33 API calls 6893->6895 6895->6891 6896 408da4 6897 408dc8 6896->6897 6898 408c80 18 API calls 6897->6898 6899 408dd1 6898->6899 6671 402caa 6672 403154 4 API calls 6671->6672 6673 402caf 6672->6673 6914 4011aa 6915 4011ac GetStdHandle 6914->6915 6674 4028ac 6675 402594 18 API calls 6674->6675 6676 4028b6 6675->6676 4986 40aab4 4987 40aab8 SetLastError 4986->4987 5018 409648 GetLastError 4987->5018 4990 40aad2 4992 40aadc CreateWindowExA SetWindowLongA 4990->4992 5031 405194 4992->5031 4996 40ab6d 4997 4032fc 18 API calls 4996->4997 4998 40ab7a 4997->4998 5048 406b7c GetCommandLineA 4998->5048 5001 4032fc 18 API calls 5002 40ab8f 5001->5002 5053 4099ec 5002->5053 5004 40aba1 5006 40abb4 5004->5006 5074 4098cc 5004->5074 5007 40abd4 5006->5007 5008 40abed 5006->5008 5080 4094d8 5007->5080 5010 40ac06 5008->5010 5012 40ac00 RemoveDirectoryA 5008->5012 5011 40ac0f DestroyWindow 5010->5011 5013 40ac1a 5010->5013 5011->5013 5012->5010 5014 40ac42 5013->5014 5088 40357c 5013->5088 5016 40ac38 5101 4025ac 5016->5101 5105 404c94 5018->5105 5026 4096c3 5120 4031b8 5026->5120 5032 4051a8 33 API calls 5031->5032 5033 4051a3 5032->5033 5034 4032fc 5033->5034 5035 403300 5034->5035 5036 40333f 5034->5036 5037 4031e8 5035->5037 5038 40330a 5035->5038 5036->4996 5044 4031fc 5037->5044 5046 403254 18 API calls 5037->5046 5039 403334 5038->5039 5040 40331d 5038->5040 5042 4034f0 18 API calls 5039->5042 5281 4034f0 5040->5281 5045 403322 5042->5045 5043 403228 5043->4996 5044->5043 5047 4025ac 4 API calls 5044->5047 5045->4996 5046->5044 5047->5043 5307 406af0 5048->5307 5050 406ba1 5051 403198 4 API calls 5050->5051 5052 406bbf 5051->5052 5052->5001 5321 4033b4 5053->5321 5055 409a27 5056 409a59 CreateProcessA 5055->5056 5057 409a65 5056->5057 5058 409a6c CloseHandle 5056->5058 5059 409648 35 API calls 5057->5059 5060 409a75 5058->5060 5059->5058 5061 4099c0 TranslateMessage DispatchMessageA PeekMessageA 5060->5061 5062 409a7a MsgWaitForMultipleObjects 5061->5062 5062->5060 5063 409a91 5062->5063 5064 4099c0 TranslateMessage DispatchMessageA PeekMessageA 5063->5064 5065 409a96 GetExitCodeProcess CloseHandle 5064->5065 5066 409ab6 5065->5066 5067 403198 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5066->5067 5068 409abe 5067->5068 5068->5004 5069 402f24 5070 403154 4 API calls 5069->5070 5071 402f29 5070->5071 5327 402bcc 5071->5327 5073 402f51 5073->5073 5075 40990e 5074->5075 5076 4098d4 5074->5076 5075->5006 5076->5075 5077 403420 18 API calls 5076->5077 5078 409908 5077->5078 5330 408e80 5078->5330 5081 409532 5080->5081 5085 4094eb 5080->5085 5081->5008 5082 4094f3 Sleep 5082->5085 5083 409503 Sleep 5083->5085 5085->5081 5085->5082 5085->5083 5086 40951a GetLastError 5085->5086 5353 408fbc 5085->5353 5086->5081 5087 409524 GetLastError 5086->5087 5087->5081 5087->5085 5089 403591 5088->5089 5090 4035a0 5088->5090 5093 4035d0 5089->5093 5094 40359b 5089->5094 5098 4035b6 5089->5098 5091 4035b1 5090->5091 5092 4035b8 5090->5092 5095 403198 4 API calls 5091->5095 5096 4031b8 4 API calls 5092->5096 5093->5098 5099 40357c 4 API calls 5093->5099 5094->5090 5097 4035ec 5094->5097 5095->5098 5096->5098 5097->5098 5370 403554 5097->5370 5098->5016 5099->5093 5102 4025b0 5101->5102 5103 4025ba 5101->5103 5102->5103 5104 403154 4 API calls 5102->5104 5103->5014 5104->5103 5128 4051a8 5105->5128 5108 407284 FormatMessageA 5109 4072aa 5108->5109 5110 403278 18 API calls 5109->5110 5111 4072c7 5110->5111 5112 408da8 5111->5112 5113 408dc8 5112->5113 5271 408c80 5113->5271 5116 405890 5117 405897 5116->5117 5118 4031e8 18 API calls 5117->5118 5119 4058af 5118->5119 5119->5026 5122 4031be 5120->5122 5121 4031e3 5124 403198 5121->5124 5122->5121 5123 4025ac 4 API calls 5122->5123 5123->5122 5125 4031b7 5124->5125 5126 40319e 5124->5126 5125->4990 5125->5069 5126->5125 5127 4025ac 4 API calls 5126->5127 5127->5125 5129 4051c5 5128->5129 5136 404e58 5129->5136 5132 4051f1 5141 403278 5132->5141 5138 404e73 5136->5138 5137 404e85 5137->5132 5146 404be4 5137->5146 5138->5137 5149 404f7a 5138->5149 5156 404e4c 5138->5156 5142 403254 18 API calls 5141->5142 5143 403288 5142->5143 5144 403198 4 API calls 5143->5144 5145 4032a0 5144->5145 5145->5108 5263 405940 5146->5263 5148 404bf5 5148->5132 5150 404f8b 5149->5150 5155 404fd9 5149->5155 5153 40505f 5150->5153 5150->5155 5152 404ff7 5152->5138 5153->5152 5163 404e38 5153->5163 5155->5152 5159 404df4 5155->5159 5157 403198 4 API calls 5156->5157 5158 404e56 5157->5158 5158->5138 5160 404e02 5159->5160 5166 404bfc 5160->5166 5162 404e30 5162->5155 5193 4039a4 5163->5193 5169 4059b0 5166->5169 5168 404c15 5168->5162 5170 4059be 5169->5170 5179 404cdc LoadStringA 5170->5179 5173 405194 33 API calls 5174 4059f6 5173->5174 5182 4031e8 5174->5182 5177 4031b8 4 API calls 5178 405a1b 5177->5178 5178->5168 5180 403278 18 API calls 5179->5180 5181 404d09 5180->5181 5181->5173 5183 4031ec 5182->5183 5186 4031fc 5182->5186 5183->5186 5188 403254 5183->5188 5184 403228 5184->5177 5186->5184 5187 4025ac 4 API calls 5186->5187 5187->5184 5189 403274 5188->5189 5190 403258 5188->5190 5189->5186 5191 402594 18 API calls 5190->5191 5192 403261 5191->5192 5192->5186 5194 4039ab 5193->5194 5199 4038b4 5194->5199 5196 4039cb 5197 403198 4 API calls 5196->5197 5198 4039d2 5197->5198 5198->5152 5200 4038d5 5199->5200 5201 4038c8 5199->5201 5203 403934 5200->5203 5204 4038db 5200->5204 5227 403780 5201->5227 5205 403993 5203->5205 5206 40393b 5203->5206 5207 4038e1 5204->5207 5208 4038ee 5204->5208 5211 4037f4 3 API calls 5205->5211 5212 403941 5206->5212 5213 40394b 5206->5213 5234 403894 5207->5234 5210 403894 6 API calls 5208->5210 5216 4038fc 5210->5216 5214 4038d0 5211->5214 5249 403864 5212->5249 5215 4037f4 3 API calls 5213->5215 5214->5196 5218 40395d 5215->5218 5239 4037f4 5216->5239 5220 403864 23 API calls 5218->5220 5222 403976 5220->5222 5221 403917 5245 40374c 5221->5245 5224 40374c VariantClear 5222->5224 5226 40398b 5224->5226 5225 40392c 5225->5196 5226->5196 5228 4037f0 5227->5228 5230 403744 5227->5230 5228->5214 5229 403793 VariantClear 5229->5230 5230->5227 5230->5229 5231 403198 4 API calls 5230->5231 5232 4037ab 5230->5232 5233 4037dc VariantCopyInd 5230->5233 5231->5230 5232->5214 5233->5228 5233->5230 5254 4036b8 5234->5254 5237 40374c VariantClear 5238 4038a9 5237->5238 5238->5214 5240 403845 VariantChangeTypeEx 5239->5240 5241 40380a VariantChangeTypeEx 5239->5241 5243 403832 5240->5243 5242 403826 5241->5242 5244 40374c VariantClear 5242->5244 5243->5221 5244->5243 5246 403766 5245->5246 5247 403759 5245->5247 5246->5225 5247->5246 5248 403779 VariantClear 5247->5248 5248->5225 5260 40369c SysStringLen 5249->5260 5252 40374c VariantClear 5253 403882 5252->5253 5253->5214 5255 4036cb 5254->5255 5256 403706 MultiByteToWideChar SysAllocStringLen MultiByteToWideChar 5255->5256 5257 4036db 5255->5257 5258 40372e 5256->5258 5259 4036ed MultiByteToWideChar SysAllocStringLen 5257->5259 5258->5237 5259->5258 5261 403610 21 API calls 5260->5261 5262 4036b3 5261->5262 5262->5252 5264 40594c 5263->5264 5265 404cdc 19 API calls 5264->5265 5266 405972 5265->5266 5267 4031e8 18 API calls 5266->5267 5268 40597d 5267->5268 5269 403198 4 API calls 5268->5269 5270 405992 5269->5270 5270->5148 5272 403198 4 API calls 5271->5272 5274 408cb1 5271->5274 5272->5274 5273 4031b8 4 API calls 5275 408d69 5273->5275 5276 408cc8 5274->5276 5277 403278 18 API calls 5274->5277 5279 4032fc 18 API calls 5274->5279 5280 408cdc 5274->5280 5275->5116 5278 4032fc 18 API calls 5276->5278 5277->5274 5278->5280 5279->5274 5280->5273 5282 4034fd 5281->5282 5289 40352d 5281->5289 5283 403526 5282->5283 5285 403509 5282->5285 5286 403254 18 API calls 5283->5286 5284 403198 4 API calls 5287 403517 5284->5287 5290 4025c4 5285->5290 5286->5289 5287->5045 5289->5284 5291 4025ca 5290->5291 5292 4025dc 5291->5292 5294 403154 5291->5294 5292->5287 5292->5292 5295 403164 5294->5295 5296 40318c TlsGetValue 5294->5296 5295->5292 5297 403196 5296->5297 5298 40316f 5296->5298 5297->5292 5302 40310c 5298->5302 5300 403174 TlsGetValue 5301 403184 5300->5301 5301->5292 5303 403120 LocalAlloc 5302->5303 5304 403116 5302->5304 5305 403132 5303->5305 5306 40313e TlsSetValue 5303->5306 5304->5303 5305->5300 5306->5305 5308 406b1c 5307->5308 5309 403278 18 API calls 5308->5309 5310 406b29 5309->5310 5317 403420 5310->5317 5312 406b31 5313 4031e8 18 API calls 5312->5313 5314 406b49 5313->5314 5315 403198 4 API calls 5314->5315 5316 406b6b 5315->5316 5316->5050 5318 403426 5317->5318 5320 403437 5317->5320 5319 403254 18 API calls 5318->5319 5318->5320 5319->5320 5320->5312 5322 4033bc 5321->5322 5323 403254 18 API calls 5322->5323 5324 4033cf 5323->5324 5325 4031e8 18 API calls 5324->5325 5326 4033f7 5325->5326 5328 402bd5 RaiseException 5327->5328 5329 402be6 5327->5329 5328->5329 5329->5073 5331 408e8e 5330->5331 5333 408ea6 5331->5333 5343 408e18 5331->5343 5334 408e18 18 API calls 5333->5334 5335 408eca 5333->5335 5334->5335 5346 407918 5335->5346 5337 408ee5 5338 408e18 18 API calls 5337->5338 5340 408ef8 5337->5340 5338->5340 5339 408e18 18 API calls 5339->5340 5340->5339 5341 403278 18 API calls 5340->5341 5342 408f27 5340->5342 5341->5340 5342->5075 5344 405890 18 API calls 5343->5344 5345 408e29 5344->5345 5345->5333 5349 4078c4 5346->5349 5350 4078d6 5349->5350 5351 4078e7 5349->5351 5352 4078db InterlockedExchange 5350->5352 5351->5337 5352->5351 5361 408f70 5353->5361 5355 408fd2 5356 408fd6 5355->5356 5357 408ff2 DeleteFileA GetLastError 5355->5357 5356->5085 5358 409010 5357->5358 5367 408fac 5358->5367 5362 408f7a 5361->5362 5363 408f7e 5361->5363 5362->5355 5364 408fa0 SetLastError 5363->5364 5365 408f87 Wow64DisableWow64FsRedirection 5363->5365 5366 408f9b 5364->5366 5365->5366 5366->5355 5368 408fb1 Wow64RevertWow64FsRedirection 5367->5368 5369 408fbb 5367->5369 5368->5369 5369->5085 5371 403566 5370->5371 5373 403578 5371->5373 5374 403604 5371->5374 5373->5097 5375 40357c 5374->5375 5378 4035d0 5375->5378 5379 40359b 5375->5379 5382 4035a0 5375->5382 5384 4035b6 5375->5384 5376 4035b1 5380 403198 4 API calls 5376->5380 5377 4035b8 5381 4031b8 4 API calls 5377->5381 5378->5384 5385 40357c 4 API calls 5378->5385 5379->5382 5383 4035ec 5379->5383 5380->5384 5381->5384 5382->5376 5382->5377 5383->5384 5386 403554 4 API calls 5383->5386 5384->5371 5385->5378 5386->5383 6677 401ab9 6678 401a96 6677->6678 6679 401aa9 RtlDeleteCriticalSection 6678->6679 6680 401a9f RtlLeaveCriticalSection 6678->6680 6680->6679

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 116 409b78-409b9c GetSystemInfo VirtualQuery 117 409ba2 116->117 118 409c2c-409c33 116->118 119 409c21-409c26 117->119 119->118 120 409ba4-409bab 119->120 121 409c0d-409c1f VirtualQuery 120->121 122 409bad-409bb1 120->122 121->118 121->119 122->121 123 409bb3-409bbb 122->123 124 409bcc-409bdd VirtualProtect 123->124 125 409bbd-409bc0 123->125 127 409be1-409be3 124->127 128 409bdf 124->128 125->124 126 409bc2-409bc5 125->126 126->124 130 409bc7-409bca 126->130 129 409bf2-409bf5 127->129 128->127 131 409be5-409bee call 409b70 129->131 132 409bf7-409bf9 129->132 130->124 130->127 131->129 132->121 134 409bfb-409c08 VirtualProtect 132->134 134->121
                                                                                                        APIs
                                                                                                        • GetSystemInfo.KERNEL32(?), ref: 00409B8A
                                                                                                        • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 00409B95
                                                                                                        • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 00409BD6
                                                                                                        • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 00409C08
                                                                                                        • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 00409C18
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Virtual$ProtectQuery$InfoSystem
                                                                                                        • String ID:
                                                                                                        • API String ID: 2441996862-0
                                                                                                        • Opcode ID: 69cc1b0b9b744b29044eea84e4744ba7a66f7205e02ae19cc0529fdcfa929845
                                                                                                        • Instruction ID: 4a1d84bb43d4a47cf168f169447d483ed62c711ee8ccb48f5bfbfd053dbeaed9
                                                                                                        • Opcode Fuzzy Hash: 69cc1b0b9b744b29044eea84e4744ba7a66f7205e02ae19cc0529fdcfa929845
                                                                                                        • Instruction Fuzzy Hash: D421A1B16043006BDA309AA99C85E57B7E8AF45360F144C2BFA99E72C3D239FC40C669
                                                                                                        APIs
                                                                                                        • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InfoLocale
                                                                                                        • String ID:
                                                                                                        • API String ID: 2299586839-0
                                                                                                        • Opcode ID: 08facca5f8c818d7ae0117448837c5e97f15c9e55cb3aedc2694e0bc5091a832
                                                                                                        • Instruction ID: 1248db9972fbf410c55bf070b604c98f5d62b90992f8f49b6b6440a9954d2c50
                                                                                                        • Opcode Fuzzy Hash: 08facca5f8c818d7ae0117448837c5e97f15c9e55cb3aedc2694e0bc5091a832
                                                                                                        • Instruction Fuzzy Hash: E2E0927170021427D710A9A99C86AEB725CEB58310F0002BFB904E73C6EDB49E804AED

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,?,0040A618), ref: 00404582
                                                                                                        • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040458F
                                                                                                        • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 004045A5
                                                                                                        • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 004045BB
                                                                                                        • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,0040A618), ref: 004045C6
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc$HandleModulePolicyProcess
                                                                                                        • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                                                                        • API String ID: 3256987805-3653653586
                                                                                                        • Opcode ID: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                                                                        • Instruction ID: 1f393095ee8ecda9e1e01b6ca7d440447e938bbc9796bcd5dbe8d266940e5f64
                                                                                                        • Opcode Fuzzy Hash: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                                                                        • Instruction Fuzzy Hash: 5FE02DD03813013AEA5032F20D83B2B20884AD0B49B2414377F25B61C3EDBDDA40587E

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • SetLastError.KERNEL32 ref: 0040AAC1
                                                                                                          • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B244,?,021724C0), ref: 0040966C
                                                                                                        • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AAFE
                                                                                                        • SetWindowLongA.USER32(00020456,000000FC,00409960), ref: 0040AB15
                                                                                                        • RemoveDirectoryA.KERNEL32(00000000,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC01
                                                                                                        • DestroyWindow.USER32(00020456,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC15
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Window$ErrorLast$CreateDestroyDirectoryLongRemove
                                                                                                        • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                                                        • API String ID: 3757039580-3001827809
                                                                                                        • Opcode ID: 7bc9c0c8e9dfd2478b94306391eafe1fb51b7566d8199cdbb2b2653dcbc3d95c
                                                                                                        • Instruction ID: 81987b3bab642c92fe87a7372e0454594c4b8fe140ce311e0f93b1eeebf6ab37
                                                                                                        • Opcode Fuzzy Hash: 7bc9c0c8e9dfd2478b94306391eafe1fb51b7566d8199cdbb2b2653dcbc3d95c
                                                                                                        • Instruction Fuzzy Hash: 25412E70604204DBDB10EBA9EE89B9E37A5EB44304F10467FF510B72E2D7B89855CB9D

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,0040A62C), ref: 004090C4
                                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090CA
                                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,0040A62C), ref: 004090DE
                                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090E4
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressHandleModuleProc
                                                                                                        • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                                                        • API String ID: 1646373207-2130885113
                                                                                                        • Opcode ID: 0414f1d66f28dc470df4633e5994336701384173b3f6f66b470f3ad827f759f7
                                                                                                        • Instruction ID: 214dda5481ef482ebe311b1329301f35405b1013d97e3062c17ffb2c8286d57d
                                                                                                        • Opcode Fuzzy Hash: 0414f1d66f28dc470df4633e5994336701384173b3f6f66b470f3ad827f759f7
                                                                                                        • Instruction Fuzzy Hash: 21017C70748342AEFB00BB76DD4AB163A68E785704F60457BF640BA2D3DABD4C04D66E

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AAFE
                                                                                                        • SetWindowLongA.USER32(00020456,000000FC,00409960), ref: 0040AB15
                                                                                                          • Part of subcall function 00406B7C: GetCommandLineA.KERNEL32(00000000,00406BC0,?,?,?,?,00000000,?,0040AB86,?), ref: 00406B94
                                                                                                          • Part of subcall function 004099EC: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,021724C0,00409AD8,00000000,00409ABF), ref: 00409A5C
                                                                                                          • Part of subcall function 004099EC: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,021724C0,00409AD8,00000000), ref: 00409A70
                                                                                                          • Part of subcall function 004099EC: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A89
                                                                                                          • Part of subcall function 004099EC: GetExitCodeProcess.KERNEL32(?,0040B244), ref: 00409A9B
                                                                                                          • Part of subcall function 004099EC: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,021724C0,00409AD8), ref: 00409AA4
                                                                                                        • RemoveDirectoryA.KERNEL32(00000000,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC01
                                                                                                        • DestroyWindow.USER32(00020456,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC15
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Window$CloseCreateHandleProcess$CodeCommandDestroyDirectoryExitLineLongMultipleObjectsRemoveWait
                                                                                                        • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                                                        • API String ID: 3586484885-3001827809
                                                                                                        • Opcode ID: c367800830601d7b7bb1e4b9cc729c69669d466ec6c890b8506752b9ad64910a
                                                                                                        • Instruction ID: d3376fcde1141b4290a3dca450fc2844fa47922897975e075ebf06e3b6db64eb
                                                                                                        • Opcode Fuzzy Hash: c367800830601d7b7bb1e4b9cc729c69669d466ec6c890b8506752b9ad64910a
                                                                                                        • Instruction Fuzzy Hash: 77411A71604204DFD714EBA9EE85B5A37B5EB48304F20427BF500BB2E1D7B8A855CB9D

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,021724C0,00409AD8,00000000,00409ABF), ref: 00409A5C
                                                                                                        • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,021724C0,00409AD8,00000000), ref: 00409A70
                                                                                                        • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A89
                                                                                                        • GetExitCodeProcess.KERNEL32(?,0040B244), ref: 00409A9B
                                                                                                        • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,021724C0,00409AD8), ref: 00409AA4
                                                                                                          • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B244,?,021724C0), ref: 0040966C
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                                                                                                        • String ID: D
                                                                                                        • API String ID: 3356880605-2746444292
                                                                                                        • Opcode ID: aadf6f075de5bdb3c28d757ddccd10dd30f6bbfdbbad62eb54c24073370c977f
                                                                                                        • Instruction ID: b58d0f6e2b8975977e6c7b71aada5392bea55c03070ce9fad3dcef5aa6d4018a
                                                                                                        • Opcode Fuzzy Hash: aadf6f075de5bdb3c28d757ddccd10dd30f6bbfdbbad62eb54c24073370c977f
                                                                                                        • Instruction Fuzzy Hash: EE1142B16402486EDB00EBE6CC42F9EB7ACEF49714F50013BB604F72C6DA785D048A69

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 136 401918-40193a RtlInitializeCriticalSection 137 401946-40197c call 4012dc * 3 LocalAlloc 136->137 138 40193c-401941 RtlEnterCriticalSection 136->138 145 4019ad-4019c1 137->145 146 40197e 137->146 138->137 150 4019c3-4019c8 RtlLeaveCriticalSection 145->150 151 4019cd 145->151 147 401983-401995 146->147 147->147 149 401997-4019a6 147->149 149->145 150->151
                                                                                                        APIs
                                                                                                        • RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                                                                        • RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                                                                        • LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                                                                        • RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                                                        • String ID:
                                                                                                        • API String ID: 730355536-0
                                                                                                        • Opcode ID: 38709c719971e1168baf9cdc3c67f999ad3db3ab521e9349fb3b390a12b3c6f3
                                                                                                        • Instruction ID: 093a8b970c40f4dda7bd37408b901a2e20e4e29fb74a5496b56404d4d89a3717
                                                                                                        • Opcode Fuzzy Hash: 38709c719971e1168baf9cdc3c67f999ad3db3ab521e9349fb3b390a12b3c6f3
                                                                                                        • Instruction Fuzzy Hash: CC0161B0684240DEE715ABA999E6B353AA4E786744F10427FF080F62F2C67C4450CB9D

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040A878
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Message
                                                                                                        • String ID: .tmp$y@
                                                                                                        • API String ID: 2030045667-2396523267
                                                                                                        • Opcode ID: 55a53fbd7ad7285035f8ab2cde1915fb146aa3dc543cd9b52406218d685c1c98
                                                                                                        • Instruction ID: 5e9257013af3d55ef2b6e359c41f87f67318ae2a4e6dbf07461b5d8c6de74657
                                                                                                        • Opcode Fuzzy Hash: 55a53fbd7ad7285035f8ab2cde1915fb146aa3dc543cd9b52406218d685c1c98
                                                                                                        • Instruction Fuzzy Hash: 3B41C030704200CFD311EF25DED1A1A77A5EB49304B214A3AF804B73E1CAB9AC11CBAD

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040A878
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Message
                                                                                                        • String ID: .tmp$y@
                                                                                                        • API String ID: 2030045667-2396523267
                                                                                                        • Opcode ID: 4e131503fe38447772e4e2294cf5373b7e2007f9fac8d76d0a71823c743fc64d
                                                                                                        • Instruction ID: 95bba075cf9db07042691c1556ef0613dbe482a65a3614fff4d0ead14828e6f7
                                                                                                        • Opcode Fuzzy Hash: 4e131503fe38447772e4e2294cf5373b7e2007f9fac8d76d0a71823c743fc64d
                                                                                                        • Instruction Fuzzy Hash: E341BE30700200DFC711EF65DED2A1A77A5EB49304B104A3AF804B73E2CAB9AC01CBAD

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00409376
                                                                                                        • GetLastError.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040937F
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateDirectoryErrorLast
                                                                                                        • String ID: .tmp
                                                                                                        • API String ID: 1375471231-2986845003
                                                                                                        • Opcode ID: 1c7982c9535877cc809d76a2290e1ec991a7408e90ad789d49a53b04ffd62ed2
                                                                                                        • Instruction ID: b240cf9bc22f775501a2d99da134be40bb2f76fb21a7d6e050461713caae6e8b
                                                                                                        • Opcode Fuzzy Hash: 1c7982c9535877cc809d76a2290e1ec991a7408e90ad789d49a53b04ffd62ed2
                                                                                                        • Instruction Fuzzy Hash: 9E216774A00208ABDB05EFA1C8429DFB7B8EF88304F50457BE901B73C2DA3C9E058A65

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 342 407749-40774a 343 4076dc-4076e6 WriteFile 342->343 344 40774c-40776f 342->344 346 4076e8-4076ea call 40748c 343->346 347 4076ef-4076f2 343->347 345 407770-407785 344->345 348 407787 345->348 349 4077f9 345->349 346->347 351 407700-407704 347->351 352 4076f4-4076fb call 4073ec 347->352 354 40778a-40778f 348->354 355 4077fd-407802 348->355 356 40783b-40783d 349->356 357 4077fb 349->357 352->351 360 407803-407819 354->360 362 407791-407792 354->362 355->360 358 407841-407843 356->358 357->355 361 40785b-40785c 358->361 360->361 372 40781b 360->372 363 4078d6-4078eb call 407890 InterlockedExchange 361->363 364 40785e-40788c 361->364 365 407724-407741 362->365 366 407794-4077b4 362->366 387 407912-407917 363->387 388 4078ed-407910 363->388 382 407820-407823 364->382 383 407890-407893 364->383 368 407743 365->368 369 4077b5 365->369 366->369 373 407746-407747 368->373 374 4077b9 368->374 377 4077b6-4077b7 369->377 378 4077f7-4077f8 369->378 379 40781e-40781f 372->379 373->342 380 4077bb-4077cd 373->380 374->380 377->374 378->349 379->382 380->358 384 4077cf-4077d4 380->384 385 407824 382->385 386 407898 382->386 383->386 384->356 392 4077d6-4077de 384->392 390 407825 385->390 391 40789a 385->391 386->391 388->387 388->388 393 407896-407897 390->393 394 407826-40782d 390->394 395 40789f 391->395 392->345 404 4077e0 392->404 393->386 397 4078a1 394->397 398 40782f 394->398 395->397 402 4078a3 397->402 403 4078ac 397->403 400 407832-407833 398->400 401 4078a5-4078aa 398->401 400->356 400->379 405 4078ae-4078af 401->405 402->401 403->405 404->378 405->395 406 4078b1-4078bd 405->406 406->386 407 4078bf-4078c0 406->407
                                                                                                        APIs
                                                                                                        • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FileWrite
                                                                                                        • String ID:
                                                                                                        • API String ID: 3934441357-0
                                                                                                        • Opcode ID: 43d3196ec1ce5242573e8f450cfa6a0a1bc6604aabb0088ea34051851cbbaa4a
                                                                                                        • Instruction ID: 20d0a63744b7af467993d3e8aec565234b7be2d060ba20bf9fd199bb98bd5a4e
                                                                                                        • Opcode Fuzzy Hash: 43d3196ec1ce5242573e8f450cfa6a0a1bc6604aabb0088ea34051851cbbaa4a
                                                                                                        • Instruction Fuzzy Hash: 8251D12294D2910FC7126B7849685A53FE0FE5331132E92FBC5C1AB1A3D27CA847D35B

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 408 401fd4-401fe6 409 401fe8 call 401918 408->409 410 401ffb-402010 408->410 416 401fed-401fef 409->416 412 402012-402017 RtlEnterCriticalSection 410->412 413 40201c-402025 410->413 412->413 414 402027 413->414 415 40202c-402032 413->415 414->415 417 402038-40203c 415->417 418 4020cb-4020d1 415->418 416->410 419 401ff1-401ff6 416->419 422 402041-402050 417->422 423 40203e 417->423 420 4020d3-4020e0 418->420 421 40211d-40211f call 401ee0 418->421 424 40214f-402158 419->424 425 4020e2-4020ea 420->425 426 4020ef-40211b call 402f54 420->426 432 402124-40213b 421->432 422->418 427 402052-402060 422->427 423->422 425->426 426->424 430 402062-402066 427->430 431 40207c-402080 427->431 434 402068 430->434 435 40206b-40207a 430->435 437 402082 431->437 438 402085-4020a0 431->438 440 402147 432->440 441 40213d-402142 RtlLeaveCriticalSection 432->441 434->435 439 4020a2-4020c6 call 402f54 435->439 437->438 438->439 439->424 441->440
                                                                                                        APIs
                                                                                                        • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00402148), ref: 00402017
                                                                                                          • Part of subcall function 00401918: RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                                                                          • Part of subcall function 00401918: RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                                                                          • Part of subcall function 00401918: LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                                                                          • Part of subcall function 00401918: RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                                                                                                        • String ID:
                                                                                                        • API String ID: 296031713-0
                                                                                                        • Opcode ID: e41243de7c80276a36dcdd2c2c0e451bb1a6f3055e5ddec7aea90b49354f7273
                                                                                                        • Instruction ID: b272be6629c35a549fc4f1c5a19e6e0df2414f51bb24a7fd7fb800939d1160d0
                                                                                                        • Opcode Fuzzy Hash: e41243de7c80276a36dcdd2c2c0e451bb1a6f3055e5ddec7aea90b49354f7273
                                                                                                        • Instruction Fuzzy Hash: D4419CB2A40711DFDB108F69DEC562A77A0FB58314B25837AD984B73E1D378A842CB48

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 444 406fa0-406ff3 SetErrorMode call 403414 LoadLibraryA
                                                                                                        APIs
                                                                                                        • SetErrorMode.KERNEL32(00008000), ref: 00406FAA
                                                                                                        • LoadLibraryA.KERNEL32(00000000,00000000,00406FF4,?,00000000,00407012,?,00008000), ref: 00406FD9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLibraryLoadMode
                                                                                                        • String ID:
                                                                                                        • API String ID: 2987862817-0
                                                                                                        • Opcode ID: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                                                                        • Instruction ID: 292e1fc4e19851716b0ab93d2d43454b233f1d25ff8a05a0d03104374ea2dcbc
                                                                                                        • Opcode Fuzzy Hash: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                                                                        • Instruction Fuzzy Hash: D6F08270A14704BEDB129FB68C5282ABBECEB4DB0475349BAF914A26D2E53C5C209568
                                                                                                        APIs
                                                                                                        • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 0040768B
                                                                                                        • GetLastError.KERNEL32(?,?,?,00000000), ref: 00407693
                                                                                                          • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,021703AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$FilePointer
                                                                                                        • String ID:
                                                                                                        • API String ID: 1156039329-0
                                                                                                        • Opcode ID: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                                                                        • Instruction ID: 64daf3b7b2b4cd691f255a674f922558070816022eb0a012369b73df1192a31e
                                                                                                        • Opcode Fuzzy Hash: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                                                                        • Instruction Fuzzy Hash: B2E092766081016FD600D55EC881B9B37DCDFC5364F104536B654EB2D1D679EC108776

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 448 40762c-40764a ReadFile 449 407663-40766a 448->449 450 40764c-407650 448->450 451 407652-40765a GetLastError 450->451 452 40765c-40765e call 40748c 450->452 451->449 451->452 452->449
                                                                                                        APIs
                                                                                                        • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00407643
                                                                                                        • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00407652
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorFileLastRead
                                                                                                        • String ID:
                                                                                                        • API String ID: 1948546556-0
                                                                                                        • Opcode ID: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                                                                        • Instruction ID: e2f452503b48da12a69c10a9d1416f2aa512a4714c212e67fea7d8588799396e
                                                                                                        • Opcode Fuzzy Hash: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                                                                        • Instruction Fuzzy Hash: 69E012A1A081106ADB24A66E9CC5F6B6BDCCBC5724F14457BF504DB382D678DC0487BB
                                                                                                        APIs
                                                                                                        • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 004075DB
                                                                                                        • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 004075E7
                                                                                                          • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,021703AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$FilePointer
                                                                                                        • String ID:
                                                                                                        • API String ID: 1156039329-0
                                                                                                        • Opcode ID: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                                                                        • Instruction ID: 74cf86129294d2faf5969c20f66175129728110ffa3c668ef2bae8a95e28f18b
                                                                                                        • Opcode Fuzzy Hash: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                                                                        • Instruction Fuzzy Hash: C4E04FB1600210AFDB10EEB98D81B9676D89F48364F0485B6EA14DF2C6D274DC00C766
                                                                                                        APIs
                                                                                                        • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                                                                                                        • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Virtual$AllocFree
                                                                                                        • String ID:
                                                                                                        • API String ID: 2087232378-0
                                                                                                        • Opcode ID: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                                                        • Instruction ID: 29306f1da17679ce7d7d3cecb65679b0075e6f6f2ddca0a826851c871ac90975
                                                                                                        • Opcode Fuzzy Hash: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                                                        • Instruction Fuzzy Hash: 57F02772B0032057DB206A6A0CC1B636AC59F85B90F1541BBFA4CFF3F9D2B98C0042A9
                                                                                                        APIs
                                                                                                        • GetSystemDefaultLCID.KERNEL32(00000000,004053B6), ref: 0040529F
                                                                                                          • Part of subcall function 00404CDC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00404CF9
                                                                                                          • Part of subcall function 0040520C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: DefaultInfoLoadLocaleStringSystem
                                                                                                        • String ID:
                                                                                                        • API String ID: 1658689577-0
                                                                                                        • Opcode ID: ef449c44a2a61a26d18614e24c7ade2666283ce56a0d8fcdc2eeed56ad2c4646
                                                                                                        • Instruction ID: b95c725f163960c8622ba1b0af82130980b93a97e76f79286a035b518bc8de08
                                                                                                        • Opcode Fuzzy Hash: ef449c44a2a61a26d18614e24c7ade2666283ce56a0d8fcdc2eeed56ad2c4646
                                                                                                        • Instruction Fuzzy Hash: 90314F75E01509ABCB00DF95C8C19EEB379FF84304F158577E815BB286E739AE068B98
                                                                                                        APIs
                                                                                                        • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateFile
                                                                                                        • String ID:
                                                                                                        • API String ID: 823142352-0
                                                                                                        • Opcode ID: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                                                                        • Instruction ID: d860c9bcffbd3325f9178b4d72e9b59b5a3ff3896166b15a891a1a6cde46a7a7
                                                                                                        • Opcode Fuzzy Hash: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                                                                        • Instruction Fuzzy Hash: 6EE06D713442082EE3409AEC6C51FA277DCD309354F008032B988DB342D5719D108BE8
                                                                                                        APIs
                                                                                                        • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateFile
                                                                                                        • String ID:
                                                                                                        • API String ID: 823142352-0
                                                                                                        • Opcode ID: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                                                                        • Instruction ID: d44512077142226ebef1615cfdb59f208ea4aebd3ed4d24446e2b73eb7949d4a
                                                                                                        • Opcode Fuzzy Hash: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                                                                        • Instruction Fuzzy Hash: A7E06D713442082ED2409AEC6C51F92779C9309354F008022B988DB342D5719D108BE8
                                                                                                        APIs
                                                                                                        • GetFileAttributesA.KERNEL32(00000000,00000000,00406A24,?,?,?,?,00000000,?,00406A39,00406D67,00000000,00406DAC,?,?,?), ref: 00406A07
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AttributesFile
                                                                                                        • String ID:
                                                                                                        • API String ID: 3188754299-0
                                                                                                        • Opcode ID: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                                                                        • Instruction ID: ccd219c895c276d3a4f2ed408fb3af00451e62210c6f1137e8185e88dac79a2a
                                                                                                        • Opcode Fuzzy Hash: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                                                                        • Instruction Fuzzy Hash: A0E0ED30300304BBD301FBA6CC42E4ABBECDB8A708BA28476B400B2682D6786E108428
                                                                                                        APIs
                                                                                                        • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                                                                          • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,021703AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorFileLastWrite
                                                                                                        • String ID:
                                                                                                        • API String ID: 442123175-0
                                                                                                        • Opcode ID: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                                                                        • Instruction ID: d11fc940c1eb4d9ab9bd5ee1403c634941755763b259216c6d34bff68e3e8731
                                                                                                        • Opcode Fuzzy Hash: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                                                                        • Instruction Fuzzy Hash: 6DE0ED766081106BD710A65AD880EAB67DCDFC5764F00407BF904DB291D574AC049676
                                                                                                        APIs
                                                                                                        • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00409127,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 004072A3
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FormatMessage
                                                                                                        • String ID:
                                                                                                        • API String ID: 1306739567-0
                                                                                                        • Opcode ID: 7ef42d69529baecca532a801bf1eab389dc79dba057db81877db687b261eaad4
                                                                                                        • Instruction ID: 7b38442d06f496379890204edef453c821f476d6c52b93f329ea0e63e965d40b
                                                                                                        • Opcode Fuzzy Hash: 7ef42d69529baecca532a801bf1eab389dc79dba057db81877db687b261eaad4
                                                                                                        • Instruction Fuzzy Hash: 17E0D8A0B8830136F22414544C87B77220E47C0700F10807E7700ED3C6D6BEA906815F
                                                                                                        APIs
                                                                                                        • SetEndOfFile.KERNEL32(?,02188000,0040AA59,00000000), ref: 004076B3
                                                                                                          • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,021703AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorFileLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 734332943-0
                                                                                                        • Opcode ID: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                                                                        • Instruction ID: f788b2e916ece263959a2b362e6cc5638f15ca068e5e6b6e193a7bb405067b9b
                                                                                                        • Opcode Fuzzy Hash: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                                                                        • Instruction Fuzzy Hash: BEC04CA1A1410047CB40A6BE89C1A1666D85A4821530485B6B908DB297D679E8004666
                                                                                                        APIs
                                                                                                        • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorMode
                                                                                                        • String ID:
                                                                                                        • API String ID: 2340568224-0
                                                                                                        • Opcode ID: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                                                                        • Instruction ID: c47f2f618e2971e07f5b1abb1c43dc6c143ad8b034d1ddbdae76011a93498253
                                                                                                        • Opcode Fuzzy Hash: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                                                                        • Instruction Fuzzy Hash: 54B09B76A1C2415DE705DAD5745153863D4D7C47143A14977F104D35C0D53DA4144519
                                                                                                        APIs
                                                                                                        • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorMode
                                                                                                        • String ID:
                                                                                                        • API String ID: 2340568224-0
                                                                                                        • Opcode ID: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                                                                        • Instruction ID: a55afa0689d716a84ca499c05243e055e04a08b2ab071a0afeb25d409e08decd
                                                                                                        • Opcode Fuzzy Hash: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                                                                        • Instruction Fuzzy Hash: FFA022A8C08000B2CE00E2E08080A3C23283A88308BC08BA2320CB20C0C03CE008020B
                                                                                                        APIs
                                                                                                        • CharPrevA.USER32(?,?,0040696C,?,00406649,?,?,00406D87,00000000,00406DAC,?,?,?,?,00000000,00000000), ref: 00406972
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CharPrev
                                                                                                        • String ID:
                                                                                                        • API String ID: 122130370-0
                                                                                                        • Opcode ID: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                                                                        • Instruction ID: 57bb655d476c0b104ac503b4dc16dcc9cc7d9309af7e6782790f501f1b0aeff9
                                                                                                        • Opcode Fuzzy Hash: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                                                                        • Instruction Fuzzy Hash:
                                                                                                        APIs
                                                                                                        • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407FA0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AllocVirtual
                                                                                                        • String ID:
                                                                                                        • API String ID: 4275171209-0
                                                                                                        • Opcode ID: 636722d4ca057b68616df378e1b8a5bd7f337355b9f7c137ab23b8dc1cafdb71
                                                                                                        • Instruction ID: 1e7236936b067224bcb0a7c190bcfb18a105a15b1652d3161176e1d0ad605fa4
                                                                                                        • Opcode Fuzzy Hash: 636722d4ca057b68616df378e1b8a5bd7f337355b9f7c137ab23b8dc1cafdb71
                                                                                                        • Instruction Fuzzy Hash: 43116371A042059BDB00EF19C881B5B7794AF44359F05807AF958AB2C6DB38E800CBAA
                                                                                                        APIs
                                                                                                        • VirtualFree.KERNEL32(?,?,00004000,?,0000000C,?,-00000008,00003FFB,004018BF), ref: 004016B2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FreeVirtual
                                                                                                        • String ID:
                                                                                                        • API String ID: 1263568516-0
                                                                                                        • Opcode ID: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                                                        • Instruction ID: 63c8255cdd02620dd55efc6405714c3c0a63becca9b218cdeda95617091702f1
                                                                                                        • Opcode Fuzzy Hash: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                                                        • Instruction Fuzzy Hash: 3601A7726442148BC310AF28DDC093A77D5EB85364F1A4A7ED985B73A1D23B6C0587A8
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseHandle
                                                                                                        • String ID:
                                                                                                        • API String ID: 2962429428-0
                                                                                                        • Opcode ID: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                                                                        • Instruction ID: e7ddd8f09f86228f97b62737e097d00c20d119481f2284b048c56b7aa048eabb
                                                                                                        • Opcode Fuzzy Hash: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                                                                        • Instruction Fuzzy Hash: 41D05E82B00A6017D615F2BE4D8869692D85F89685B08843AF654E77D1D67CEC00838D
                                                                                                        APIs
                                                                                                        • VirtualFree.KERNEL32(?,00000000,00008000,?,00407E9D), ref: 00407ECF
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FreeVirtual
                                                                                                        • String ID:
                                                                                                        • API String ID: 1263568516-0
                                                                                                        • Opcode ID: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                                                                        • Instruction ID: 622015b425f940adf6dc1d0f89e873b9c6d17cfe6f0c2733970da1323f12c917
                                                                                                        • Opcode Fuzzy Hash: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                                                                        • Instruction Fuzzy Hash: 3ED0E9B17553055BDB90EEB98CC1B0237D8BB48610F5044B66904EB296E674E8009654
                                                                                                        APIs
                                                                                                        • GetCurrentProcess.KERNEL32(00000028), ref: 00409457
                                                                                                        • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 0040945D
                                                                                                        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00409476
                                                                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 0040949D
                                                                                                        • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 004094A2
                                                                                                        • ExitWindowsEx.USER32(00000002,00000000), ref: 004094B3
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                                                        • String ID: SeShutdownPrivilege
                                                                                                        • API String ID: 107509674-3733053543
                                                                                                        • Opcode ID: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                                                                        • Instruction ID: 55e16e97e4c30333ef6e9d7cb44a764448f3c494fd9ead6bbbdf5d5bb2f9c1eb
                                                                                                        • Opcode Fuzzy Hash: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                                                                        • Instruction Fuzzy Hash: 61F012B069830179E610AAB18D07F6762885BC4B18F50493ABB15FA1C3D7BDD809466F
                                                                                                        APIs
                                                                                                        • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 00409C3E
                                                                                                        • SizeofResource.KERNEL32(00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 00409C51
                                                                                                        • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92,?,00000000), ref: 00409C63
                                                                                                        • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92), ref: 00409C74
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Resource$FindLoadLockSizeof
                                                                                                        • String ID:
                                                                                                        • API String ID: 3473537107-0
                                                                                                        • Opcode ID: 66472a43d98f2116202d14454299061058d21427157a3f4f4112e001326967e1
                                                                                                        • Instruction ID: 5c2a5118689e511edc0a9dde7e1b9e77d0383d271af581b44440e1e73e890ea9
                                                                                                        • Opcode Fuzzy Hash: 66472a43d98f2116202d14454299061058d21427157a3f4f4112e001326967e1
                                                                                                        • Instruction Fuzzy Hash: B0E07E80B8874726FA6576FB08C7B6B008C4BA570EF00003BB700792C3DDBC8C04462E
                                                                                                        APIs
                                                                                                        • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040545A,?,?,?,00000000,0040560C), ref: 0040526B
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InfoLocale
                                                                                                        • String ID:
                                                                                                        • API String ID: 2299586839-0
                                                                                                        • Opcode ID: b79b605a6dbd2dbd76dc5df923bc970e8acc9169766131cf64cabc826e101d13
                                                                                                        • Instruction ID: 1db3d1c1bb6fab5f91442dea8a08a829cd161d84d3a7e1f0c2fe21aaaafd944f
                                                                                                        • Opcode Fuzzy Hash: b79b605a6dbd2dbd76dc5df923bc970e8acc9169766131cf64cabc826e101d13
                                                                                                        • Instruction Fuzzy Hash: 9ED02EA230E2006AE210808B2C84EBB4A9CCEC53A0F00007FF648C3242D2208C029B76
                                                                                                        APIs
                                                                                                        • GetSystemTime.KERNEL32(?), ref: 004026CE
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: SystemTime
                                                                                                        • String ID:
                                                                                                        • API String ID: 2656138-0
                                                                                                        • Opcode ID: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                                                        • Instruction ID: 69442b1fa125f02c17f5f00667ba5619268a94e84ed87230136e9e38920861ba
                                                                                                        • Opcode Fuzzy Hash: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                                                        • Instruction Fuzzy Hash: 14E04F21E0010A82C704ABA5CD435EDF7AEAB95600B044272A418E92E0F631C251C748
                                                                                                        APIs
                                                                                                        • GetVersionExA.KERNEL32(?,004065F0,00000000,004065FE,?,?,?,?,?,0040A622), ref: 00405D02
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Version
                                                                                                        • String ID:
                                                                                                        • API String ID: 1889659487-0
                                                                                                        • Opcode ID: 804cda8d473c4c61bcc63f12479ba9190822d5c554409fc9a119c77cb0a2aa37
                                                                                                        • Instruction ID: 4c33b40dd65743d8d98a5ffd827b1eb297e5dd4f71424004bfe2d5ab9b26ea54
                                                                                                        • Opcode Fuzzy Hash: 804cda8d473c4c61bcc63f12479ba9190822d5c554409fc9a119c77cb0a2aa37
                                                                                                        • Instruction Fuzzy Hash: 00C0126040070186D7109B31DC02B1672D4AB44310F4405396DA4963C2E73C80018A6E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 4d767100099eb102bdc21c19fdb755dbde7929e86d9821f584b3da527505dd0e
                                                                                                        • Instruction ID: 7dc6dc86846b3232beed044054ddb30c9891ac2fec336679fba6e94018ae2b4c
                                                                                                        • Opcode Fuzzy Hash: 4d767100099eb102bdc21c19fdb755dbde7929e86d9821f584b3da527505dd0e
                                                                                                        • Instruction Fuzzy Hash: C032D775E00219DFCB14CF99CA80AADB7B2BF88314F24816AD855B7385DB34AE42CF55
                                                                                                        APIs
                                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,00409918), ref: 0040704D
                                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407053
                                                                                                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,00409918), ref: 004070A1
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressCloseHandleModuleProc
                                                                                                        • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                                                                        • API String ID: 4190037839-2401316094
                                                                                                        • Opcode ID: 84283e8ecd5f01446eeee6c4ca3ac4597d6d061694d9d4138b3ca6e7d0b19e25
                                                                                                        • Instruction ID: c068e7fb85b52830e378cef5638f1cf195f9e270113e5aa630163df598a56aa7
                                                                                                        • Opcode Fuzzy Hash: 84283e8ecd5f01446eeee6c4ca3ac4597d6d061694d9d4138b3ca6e7d0b19e25
                                                                                                        • Instruction Fuzzy Hash: 72214170E04209ABDB10EAB5CC55A9E77A9EB48304F60847BA510FB3C1D7BCAE01875E
                                                                                                        APIs
                                                                                                        • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                                                                                                        • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                                                                                                        • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                                                                                                        • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                                                                                                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                                                                                                        • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                                                                                                        • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                                                                                                        • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                                                                                                        • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                                                                                                        • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                                                        • String ID:
                                                                                                        • API String ID: 1694776339-0
                                                                                                        • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                                                        • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                                                                                                        • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                                                        • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                                                                                                        APIs
                                                                                                        • GetSystemDefaultLCID.KERNEL32(00000000,0040560C,?,?,?,?,00000000,00000000,00000000,?,004065EB,00000000,004065FE), ref: 004053DE
                                                                                                          • Part of subcall function 0040520C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                                                                                                          • Part of subcall function 00405258: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040545A,?,?,?,00000000,0040560C), ref: 0040526B
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InfoLocale$DefaultSystem
                                                                                                        • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                                                        • API String ID: 1044490935-665933166
                                                                                                        • Opcode ID: 2becd82198b95216644133442ecc563e5ef80f5327bc31795fb041598c227e39
                                                                                                        • Instruction ID: cc137df54ae1fcbb63b87987e69a719e9c27c4b31815d0debc5c9b1d2781c89a
                                                                                                        • Opcode Fuzzy Hash: 2becd82198b95216644133442ecc563e5ef80f5327bc31795fb041598c227e39
                                                                                                        • Instruction Fuzzy Hash: F8515374B00548ABDB00EBA59891A5F7769DB88304F50D5BBB515BB3C6CA3DCA058F1C
                                                                                                        APIs
                                                                                                        • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00401AB4), ref: 00401A09
                                                                                                        • LocalFree.KERNEL32(005CA950,00000000,00401AB4), ref: 00401A1B
                                                                                                        • VirtualFree.KERNEL32(?,00000000,00008000,005CA950,00000000,00401AB4), ref: 00401A3A
                                                                                                        • LocalFree.KERNEL32(005CB950,?,00000000,00008000,005CA950,00000000,00401AB4), ref: 00401A79
                                                                                                        • RtlLeaveCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AA4
                                                                                                        • RtlDeleteCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AAE
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                                                        • String ID:
                                                                                                        • API String ID: 3782394904-0
                                                                                                        • Opcode ID: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                                                        • Instruction ID: 5447b05044442752c1d56c7733342563ab4b4f61826a3093f511f794066d9233
                                                                                                        • Opcode Fuzzy Hash: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                                                        • Instruction Fuzzy Hash: 91116330341280DAD711ABA59EE2F623668B785748F44437EF444B62F2C67C9840CA9D
                                                                                                        APIs
                                                                                                        • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                                                                                                        • ExitProcess.KERNEL32 ref: 00403DE5
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ExitMessageProcess
                                                                                                        • String ID: Error$Runtime error at 00000000$9@
                                                                                                        • API String ID: 1220098344-1503883590
                                                                                                        • Opcode ID: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                                                        • Instruction ID: db3008c0e6bc5d60e05df0545d3e9f81ce91e923819fa2a9fb93000da4b6b716
                                                                                                        • Opcode Fuzzy Hash: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                                                        • Instruction Fuzzy Hash: B521F830A04341CAE714EFA59AD17153E98AB49349F04837BD500B73E3C77C8A45C76E
                                                                                                        APIs
                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                                                                                                        • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                                                                                                        • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ByteCharMultiWide$AllocString
                                                                                                        • String ID:
                                                                                                        • API String ID: 262959230-0
                                                                                                        • Opcode ID: 759139aa8138bb4f1b890a81a570935fc2f09484a8ccbcda4eb7e9d11bc9ffe5
                                                                                                        • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                                                                                                        • Opcode Fuzzy Hash: 759139aa8138bb4f1b890a81a570935fc2f09484a8ccbcda4eb7e9d11bc9ffe5
                                                                                                        • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                                                                                                        APIs
                                                                                                        • GetModuleHandleA.KERNEL32(00000000,0040A60E), ref: 004030E3
                                                                                                        • GetCommandLineA.KERNEL32(00000000,0040A60E), ref: 004030EE
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CommandHandleLineModule
                                                                                                        • String ID: U1hd.@$`&[
                                                                                                        • API String ID: 2123368496-2802061170
                                                                                                        • Opcode ID: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                                                        • Instruction ID: 0f926add87520dc699e98d27074396f9fab16295c11a520b4b5863bd90c7cb52
                                                                                                        • Opcode Fuzzy Hash: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                                                        • Instruction Fuzzy Hash: 03C01274541300CAD328AFF69E8A304B990A385349F40823FA608BA2F1CA7C4201EBDD
                                                                                                        APIs
                                                                                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000,00409918,00000000), ref: 00406E4C
                                                                                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,70000000,?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000), ref: 00406EBC
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: QueryValue
                                                                                                        • String ID: )q@
                                                                                                        • API String ID: 3660427363-2284170586
                                                                                                        • Opcode ID: 32d2d681139902fa63b50b1e86c1c6042aee641263ad409bd5d16b68eaa8278f
                                                                                                        • Instruction ID: 22a93fbabe645b78fd14ced98f65bd4bcb22fe3fd6f8222f7fa8e6a3c98f8dfc
                                                                                                        • Opcode Fuzzy Hash: 32d2d681139902fa63b50b1e86c1c6042aee641263ad409bd5d16b68eaa8278f
                                                                                                        • Instruction Fuzzy Hash: E6415E31D0021AAFDB21DF95C881BAFB7B8EB04704F56447AE901F7280D738AF108B99
                                                                                                        APIs
                                                                                                        • MessageBoxA.USER32(00000000,00000000,Setup,00000010), ref: 00409CBD
                                                                                                        Strings
                                                                                                        • The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si, xrefs: 00409CA1
                                                                                                        • Setup, xrefs: 00409CAD
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Message
                                                                                                        • String ID: Setup$The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si
                                                                                                        • API String ID: 2030045667-3271211647
                                                                                                        • Opcode ID: bc66b1cf8cea732a030952d466b76090b354ad7a58696f118c0a4b0261ee3717
                                                                                                        • Instruction ID: b8b600ed6bdfe48e96a015bdf4867c85bc36f5512d0f27a60c0f94c744360238
                                                                                                        • Opcode Fuzzy Hash: bc66b1cf8cea732a030952d466b76090b354ad7a58696f118c0a4b0261ee3717
                                                                                                        • Instruction Fuzzy Hash: 8EE0E5302482087EE311EA528C13F6A7BACE789B04F600477F900B15C3D6786E00A068
                                                                                                        APIs
                                                                                                        • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 004094F7
                                                                                                        • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 00409507
                                                                                                        • GetLastError.KERNEL32(?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 0040951A
                                                                                                        • GetLastError.KERNEL32(?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 00409524
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.3289384745.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.3289358000.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289419678.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.3289466209.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLastSleep
                                                                                                        • String ID:
                                                                                                        • API String ID: 1458359878-0
                                                                                                        • Opcode ID: 97bb3b87fdda019371420e794be163fcf62410a15a23215566f33b90e6dc6563
                                                                                                        • Instruction ID: cd4a420f7ace5638a97e0bdb8a1e9fccbb234b9240edd4770f97938e6011a3cc
                                                                                                        • Opcode Fuzzy Hash: 97bb3b87fdda019371420e794be163fcf62410a15a23215566f33b90e6dc6563
                                                                                                        • Instruction Fuzzy Hash: 16F0967360451477CA35A5AF9D81A5F634DDAD1354B10813BE945F3283C538DD0142A9

                                                                                                        Execution Graph

                                                                                                        Execution Coverage:16%
                                                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                                                        Signature Coverage:4.7%
                                                                                                        Total number of Nodes:2000
                                                                                                        Total number of Limit Nodes:83
                                                                                                        execution_graph 49968 40cd00 49969 40cd12 49968->49969 49970 40cd0d 49968->49970 49972 406f48 CloseHandle 49970->49972 49972->49969 49973 492848 49974 49287c 49973->49974 49975 49287e 49974->49975 49976 492892 49974->49976 50119 446f9c 18 API calls 49975->50119 49979 4928ce 49976->49979 49980 4928a1 49976->49980 49978 492887 Sleep 50039 4928c9 49978->50039 49985 49290a 49979->49985 49986 4928dd 49979->49986 50109 446ff8 49980->50109 49984 4928b0 49987 4928b8 FindWindowA 49984->49987 49991 492919 49985->49991 49992 492960 49985->49992 49988 446ff8 18 API calls 49986->49988 50113 447278 49987->50113 49990 4928ea 49988->49990 49994 4928f2 FindWindowA 49990->49994 50120 446f9c 18 API calls 49991->50120 49998 4929bc 49992->49998 49999 49296f 49992->49999 49996 447278 5 API calls 49994->49996 49995 492925 50121 446f9c 18 API calls 49995->50121 50052 492905 49996->50052 50006 492a18 49998->50006 50007 4929cb 49998->50007 50124 446f9c 18 API calls 49999->50124 50001 492932 50122 446f9c 18 API calls 50001->50122 50002 49297b 50125 446f9c 18 API calls 50002->50125 50005 49293f 50123 446f9c 18 API calls 50005->50123 50017 492a52 50006->50017 50018 492a27 50006->50018 50129 446f9c 18 API calls 50007->50129 50008 492988 50126 446f9c 18 API calls 50008->50126 50012 49294a SendMessageA 50016 447278 5 API calls 50012->50016 50013 4929d7 50130 446f9c 18 API calls 50013->50130 50015 492995 50127 446f9c 18 API calls 50015->50127 50016->50052 50026 492a61 50017->50026 50027 492aa0 50017->50027 50021 446ff8 18 API calls 50018->50021 50019 4929e4 50131 446f9c 18 API calls 50019->50131 50024 492a34 50021->50024 50023 4929a0 PostMessageA 50128 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50023->50128 50031 492a3c RegisterClipboardFormatA 50024->50031 50025 4929f1 50132 446f9c 18 API calls 50025->50132 50134 446f9c 18 API calls 50026->50134 50035 492aaf 50027->50035 50041 492af4 50027->50041 50032 447278 5 API calls 50031->50032 50032->50039 50033 4929fc SendNotifyMessageA 50133 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50033->50133 50034 492a6d 50135 446f9c 18 API calls 50034->50135 50137 446f9c 18 API calls 50035->50137 50159 403420 50039->50159 50040 492a7a 50136 446f9c 18 API calls 50040->50136 50046 492b48 50041->50046 50047 492b03 50041->50047 50042 492abb 50138 446f9c 18 API calls 50042->50138 50045 492a85 SendMessageA 50049 447278 5 API calls 50045->50049 50056 492baa 50046->50056 50057 492b57 50046->50057 50141 446f9c 18 API calls 50047->50141 50048 492ac8 50139 446f9c 18 API calls 50048->50139 50049->50052 50052->50039 50053 492b0f 50142 446f9c 18 API calls 50053->50142 50055 492ad3 PostMessageA 50140 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50055->50140 50064 492bb9 50056->50064 50065 492c31 50056->50065 50060 446ff8 18 API calls 50057->50060 50058 492b1c 50143 446f9c 18 API calls 50058->50143 50062 492b64 50060->50062 50145 42e394 SetErrorMode 50062->50145 50063 492b27 SendNotifyMessageA 50144 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50063->50144 50068 446ff8 18 API calls 50064->50068 50073 492c40 50065->50073 50074 492c66 50065->50074 50070 492bc8 50068->50070 50069 492b71 50071 492b87 GetLastError 50069->50071 50072 492b77 50069->50072 50148 446f9c 18 API calls 50070->50148 50075 447278 5 API calls 50071->50075 50076 447278 5 API calls 50072->50076 50153 446f9c 18 API calls 50073->50153 50083 492c98 50074->50083 50084 492c75 50074->50084 50077 492b85 50075->50077 50076->50077 50080 447278 5 API calls 50077->50080 50079 492c4a FreeLibrary 50154 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50079->50154 50080->50039 50092 492ca7 50083->50092 50098 492cdb 50083->50098 50088 446ff8 18 API calls 50084->50088 50085 492bdb GetProcAddress 50086 492c21 50085->50086 50087 492be7 50085->50087 50152 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50086->50152 50149 446f9c 18 API calls 50087->50149 50090 492c81 50088->50090 50096 492c89 CreateMutexA 50090->50096 50155 48ccc8 18 API calls 50092->50155 50093 492bf3 50150 446f9c 18 API calls 50093->50150 50096->50039 50097 492c00 50101 447278 5 API calls 50097->50101 50098->50039 50157 48ccc8 18 API calls 50098->50157 50100 492cb3 50102 492cc4 OemToCharBuffA 50100->50102 50103 492c11 50101->50103 50156 48cce0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50102->50156 50151 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50103->50151 50106 492cf6 50107 492d07 CharToOemBuffA 50106->50107 50158 48cce0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50107->50158 50110 447000 50109->50110 50163 436078 50110->50163 50112 44701f 50112->49984 50114 447280 50113->50114 50217 4363e0 VariantClear 50114->50217 50116 4472a3 50117 4472ba 50116->50117 50218 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50116->50218 50117->50039 50119->49978 50120->49995 50121->50001 50122->50005 50123->50012 50124->50002 50125->50008 50126->50015 50127->50023 50128->50052 50129->50013 50130->50019 50131->50025 50132->50033 50133->50039 50134->50034 50135->50040 50136->50045 50137->50042 50138->50048 50139->50055 50140->50052 50141->50053 50142->50058 50143->50063 50144->50039 50219 403738 50145->50219 50148->50085 50149->50093 50150->50097 50151->50052 50152->50052 50153->50079 50154->50039 50155->50100 50156->50039 50157->50106 50158->50039 50161 403426 50159->50161 50160 40344b 50161->50160 50162 402660 4 API calls 50161->50162 50162->50161 50164 436084 50163->50164 50174 4360a6 50163->50174 50164->50174 50183 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50164->50183 50165 436129 50192 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50165->50192 50167 436111 50187 403494 50167->50187 50168 436105 50168->50112 50169 4360f9 50178 403510 4 API calls 50169->50178 50170 4360ed 50184 403510 50170->50184 50171 43611d 50191 4040e8 18 API calls 50171->50191 50174->50165 50174->50167 50174->50168 50174->50169 50174->50170 50174->50171 50177 43613a 50177->50112 50182 436102 50178->50182 50180 436126 50180->50112 50182->50112 50183->50174 50193 4034e0 50184->50193 50188 403498 50187->50188 50189 4034ba 50188->50189 50190 402660 4 API calls 50188->50190 50189->50112 50190->50189 50191->50180 50192->50177 50198 4034bc 50193->50198 50195 4034f0 50203 403400 50195->50203 50199 4034c0 50198->50199 50200 4034dc 50198->50200 50207 402648 50199->50207 50200->50195 50204 403406 50203->50204 50205 40341f 50203->50205 50204->50205 50212 402660 50204->50212 50205->50112 50208 40264c 50207->50208 50210 402656 50207->50210 50208->50210 50211 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50208->50211 50210->50195 50211->50210 50213 402664 50212->50213 50214 40266e 50212->50214 50213->50214 50216 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50213->50216 50214->50205 50214->50214 50216->50214 50217->50116 50218->50117 50220 40373c LoadLibraryA 50219->50220 50220->50069 54109 498ba8 54167 403344 54109->54167 54111 498bb6 54170 4056a0 54111->54170 54113 498bbb 54173 40631c GetModuleHandleA GetProcAddress 54113->54173 54117 498bc5 54181 40994c 54117->54181 54448 4032fc 54167->54448 54169 403349 GetModuleHandleA GetCommandLineA 54169->54111 54171 4056db 54170->54171 54449 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54170->54449 54171->54113 54174 406338 54173->54174 54175 40633f GetProcAddress 54173->54175 54174->54175 54176 406355 GetProcAddress 54175->54176 54177 40634e 54175->54177 54178 406364 SetProcessDEPPolicy 54176->54178 54179 406368 54176->54179 54177->54176 54178->54179 54180 4063c4 6F541CD0 54179->54180 54180->54117 54450 409024 54181->54450 54448->54169 54449->54171 54451 408cbc 5 API calls 54450->54451 54452 409035 54451->54452 54453 4085dc GetSystemDefaultLCID 54452->54453 54456 408612 54453->54456 54454 406dec LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54454->54456 54455 408568 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 54455->54456 54456->54454 54456->54455 54457 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54456->54457 54461 408674 54456->54461 54457->54456 54458 406dec LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54458->54461 54459 408568 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 54459->54461 54460 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54460->54461 54461->54458 54461->54459 54461->54460 54462 4086f7 54461->54462 54463 403420 4 API calls 54462->54463 54464 408711 54463->54464 54465 408720 GetSystemDefaultLCID 54464->54465 54522 408568 GetLocaleInfoA 54465->54522 54468 403450 4 API calls 54469 408760 54468->54469 54470 408568 5 API calls 54469->54470 54471 408775 54470->54471 54472 408568 5 API calls 54471->54472 54473 408799 54472->54473 54528 4085b4 GetLocaleInfoA 54473->54528 54476 4085b4 GetLocaleInfoA 54477 4087c9 54476->54477 54478 408568 5 API calls 54477->54478 54479 4087e3 54478->54479 54480 4085b4 GetLocaleInfoA 54479->54480 54523 4085a1 54522->54523 54524 40858f 54522->54524 54526 403494 4 API calls 54523->54526 54525 4034e0 4 API calls 54524->54525 54527 40859f 54525->54527 54526->54527 54527->54468 54529 4085d0 54528->54529 54529->54476 55883 42f520 55884 42f52b 55883->55884 55885 42f52f NtdllDefWindowProc_A 55883->55885 55885->55884 50221 416b42 50222 416bea 50221->50222 50223 416b5a 50221->50223 50240 41531c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50222->50240 50225 416b74 SendMessageA 50223->50225 50226 416b68 50223->50226 50236 416bc8 50225->50236 50227 416b72 CallWindowProcA 50226->50227 50228 416b8e 50226->50228 50227->50236 50237 41a058 GetSysColor 50228->50237 50231 416b99 SetTextColor 50232 416bae 50231->50232 50238 41a058 GetSysColor 50232->50238 50234 416bb3 SetBkColor 50239 41a6e0 GetSysColor CreateBrushIndirect 50234->50239 50237->50231 50238->50234 50239->50236 50240->50236 55886 4358e0 55887 4358f5 55886->55887 55891 43590f 55887->55891 55892 4352c8 55887->55892 55901 435312 55892->55901 55902 4352f8 55892->55902 55893 403400 4 API calls 55894 435717 55893->55894 55894->55891 55905 435728 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55894->55905 55895 446da4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55895->55902 55896 403744 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55896->55902 55897 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55897->55902 55898 402648 4 API calls 55898->55902 55900 431ca0 4 API calls 55900->55902 55901->55893 55902->55895 55902->55896 55902->55897 55902->55898 55902->55900 55902->55901 55903 4038a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55902->55903 55906 4343b0 55902->55906 55918 434b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55902->55918 55903->55902 55905->55891 55907 43446d 55906->55907 55908 4343dd 55906->55908 55937 434310 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55907->55937 55909 403494 4 API calls 55908->55909 55911 4343eb 55909->55911 55913 403778 4 API calls 55911->55913 55912 43445f 55914 403400 4 API calls 55912->55914 55916 43440c 55913->55916 55915 4344bd 55914->55915 55915->55902 55916->55912 55919 494944 55916->55919 55918->55902 55920 49497c 55919->55920 55921 494a14 55919->55921 55923 403494 4 API calls 55920->55923 55938 448930 55921->55938 55926 494987 55923->55926 55924 494997 55925 403400 4 API calls 55924->55925 55927 494a38 55925->55927 55926->55924 55928 4037b8 4 API calls 55926->55928 55929 403400 4 API calls 55927->55929 55931 4949b0 55928->55931 55930 494a40 55929->55930 55930->55916 55931->55924 55932 4037b8 4 API calls 55931->55932 55933 4949d3 55932->55933 55934 403778 4 API calls 55933->55934 55935 494a04 55934->55935 55936 403634 4 API calls 55935->55936 55936->55921 55937->55912 55939 448955 55938->55939 55940 448998 55938->55940 55941 403494 4 API calls 55939->55941 55943 4489ac 55940->55943 55950 44852c 55940->55950 55942 448960 55941->55942 55947 4037b8 4 API calls 55942->55947 55945 403400 4 API calls 55943->55945 55946 4489df 55945->55946 55946->55924 55948 44897c 55947->55948 55949 4037b8 4 API calls 55948->55949 55949->55940 55951 403494 4 API calls 55950->55951 55952 448562 55951->55952 55953 4037b8 4 API calls 55952->55953 55954 448574 55953->55954 55955 403778 4 API calls 55954->55955 55956 448595 55955->55956 55957 4037b8 4 API calls 55956->55957 55958 4485ad 55957->55958 55959 403778 4 API calls 55958->55959 55960 4485d8 55959->55960 55961 4037b8 4 API calls 55960->55961 55971 4485f0 55961->55971 55962 448628 55964 403420 4 API calls 55962->55964 55963 4486c3 55967 4486cb GetProcAddress 55963->55967 55968 448708 55964->55968 55965 44864b LoadLibraryExA 55965->55971 55966 44865d LoadLibraryA 55966->55971 55969 4486de 55967->55969 55968->55943 55969->55962 55970 403b80 4 API calls 55970->55971 55971->55962 55971->55963 55971->55965 55971->55966 55971->55970 55972 403450 4 API calls 55971->55972 55974 43da88 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55971->55974 55972->55971 55974->55971 50241 402584 50242 402598 50241->50242 50243 4025ab 50241->50243 50271 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 50242->50271 50245 4025c2 RtlEnterCriticalSection 50243->50245 50246 4025cc 50243->50246 50245->50246 50257 4023b4 13 API calls 50246->50257 50247 40259d 50247->50243 50249 4025a1 50247->50249 50250 4025d9 50253 402635 50250->50253 50254 40262b RtlLeaveCriticalSection 50250->50254 50251 4025d5 50251->50250 50258 402088 50251->50258 50254->50253 50255 4025e5 50255->50250 50272 402210 9 API calls 50255->50272 50257->50251 50259 40209c 50258->50259 50260 4020af 50258->50260 50279 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 50259->50279 50262 4020c6 RtlEnterCriticalSection 50260->50262 50265 4020d0 50260->50265 50262->50265 50263 4020a1 50263->50260 50264 4020a5 50263->50264 50266 402106 50264->50266 50265->50266 50273 401f94 50265->50273 50266->50255 50269 4021f1 RtlLeaveCriticalSection 50270 4021fb 50269->50270 50270->50255 50271->50247 50272->50250 50276 401fa4 50273->50276 50274 401fd0 50278 401ff4 50274->50278 50285 401db4 50274->50285 50276->50274 50276->50278 50280 401f0c 50276->50280 50278->50269 50278->50270 50279->50263 50289 40178c 50280->50289 50282 401f1c 50283 401f29 50282->50283 50298 401e80 9 API calls 50282->50298 50283->50276 50286 401dd2 50285->50286 50287 401e02 50285->50287 50286->50278 50287->50286 50314 401d1c 50287->50314 50294 4017a8 50289->50294 50291 4017b2 50299 401678 50291->50299 50294->50291 50295 4017be 50294->50295 50296 401803 50294->50296 50303 4014e4 50294->50303 50311 4013e0 LocalAlloc 50294->50311 50295->50282 50312 4015c0 VirtualFree 50296->50312 50298->50283 50300 4016be 50299->50300 50301 4016da VirtualAlloc 50300->50301 50302 4016ee 50300->50302 50301->50300 50301->50302 50302->50295 50304 4014f3 VirtualAlloc 50303->50304 50306 401520 50304->50306 50307 401543 50304->50307 50313 401398 LocalAlloc 50306->50313 50307->50294 50309 40152c 50309->50307 50310 401530 VirtualFree 50309->50310 50310->50307 50311->50294 50312->50295 50313->50309 50315 401d2e 50314->50315 50316 401d51 50315->50316 50317 401d63 50315->50317 50327 401940 50316->50327 50319 401940 3 API calls 50317->50319 50320 401d61 50319->50320 50326 401d79 50320->50326 50337 401bf8 9 API calls 50320->50337 50322 401d88 50323 401da2 50322->50323 50338 401c4c 9 API calls 50322->50338 50339 401454 LocalAlloc 50323->50339 50326->50286 50328 4019bf 50327->50328 50329 401966 50327->50329 50328->50320 50340 40170c 50329->50340 50333 401983 50334 40199a 50333->50334 50345 4015c0 VirtualFree 50333->50345 50334->50328 50346 401454 LocalAlloc 50334->50346 50337->50322 50338->50323 50339->50326 50342 401743 50340->50342 50341 401783 50344 4013e0 LocalAlloc 50341->50344 50342->50341 50343 40175d VirtualFree 50342->50343 50343->50342 50344->50333 50345->50334 50346->50328 50347 416644 50348 416651 50347->50348 50349 4166ab 50347->50349 50354 416550 CreateWindowExA 50348->50354 50350 416658 SetPropA SetPropA 50350->50349 50351 41668b 50350->50351 50352 41669e SetWindowPos 50351->50352 50352->50349 50354->50350 55975 4222e4 55976 4222f3 55975->55976 55981 421274 55976->55981 55979 422313 55982 4212e3 55981->55982 55984 421283 55981->55984 55986 4212f4 55982->55986 56006 4124d0 GetMenuItemCount GetMenuStringA GetMenuState 55982->56006 55984->55982 56005 408d2c 19 API calls 55984->56005 55985 421322 55992 421395 55985->55992 55996 42133d 55985->55996 55986->55985 55987 4213ba 55986->55987 55989 4213ce SetMenu 55987->55989 56002 421393 55987->56002 55988 4213e6 56009 4211bc 10 API calls 55988->56009 55989->56002 55994 4213a9 55992->55994 55992->56002 55993 4213ed 55993->55979 56004 4221e8 10 API calls 55993->56004 55997 4213b2 SetMenu 55994->55997 55998 421360 GetMenu 55996->55998 55996->56002 55997->56002 55999 421383 55998->55999 56000 42136a 55998->56000 56007 4124d0 GetMenuItemCount GetMenuStringA GetMenuState 55999->56007 56003 42137d SetMenu 56000->56003 56002->55988 56008 421e2c 11 API calls 56002->56008 56003->55999 56004->55979 56005->55984 56006->55986 56007->56002 56008->55988 56009->55993 56010 44b4a8 56011 44b4b6 56010->56011 56013 44b4d5 56010->56013 56012 44b38c 11 API calls 56011->56012 56011->56013 56012->56013 56014 448728 56015 448756 56014->56015 56016 44875d 56014->56016 56019 403400 4 API calls 56015->56019 56017 448771 56016->56017 56020 44852c 7 API calls 56016->56020 56017->56015 56018 403494 4 API calls 56017->56018 56021 44878a 56018->56021 56022 448907 56019->56022 56020->56017 56023 4037b8 4 API calls 56021->56023 56024 4487a6 56023->56024 56025 4037b8 4 API calls 56024->56025 56026 4487c2 56025->56026 56026->56015 56027 4487d6 56026->56027 56028 4037b8 4 API calls 56027->56028 56029 4487f0 56028->56029 56030 431bd0 4 API calls 56029->56030 56031 448812 56030->56031 56032 431ca0 4 API calls 56031->56032 56033 448832 56031->56033 56032->56031 56034 448870 56033->56034 56057 4435d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56033->56057 56035 448888 56034->56035 56058 4435d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56034->56058 56046 442334 56035->56046 56038 4488bc GetLastError 56059 4484c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56038->56059 56041 4488cb 56060 443610 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56041->56060 56043 4488e0 56061 443620 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56043->56061 56045 4488e8 56047 443312 56046->56047 56048 44236d 56046->56048 56050 403400 4 API calls 56047->56050 56049 403400 4 API calls 56048->56049 56051 442375 56049->56051 56052 443327 56050->56052 56053 431bd0 4 API calls 56051->56053 56052->56038 56054 442381 56053->56054 56055 443302 56054->56055 56062 441a0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56054->56062 56055->56038 56057->56033 56058->56035 56059->56041 56060->56043 56061->56045 56062->56054 56063 4165ec DestroyWindow 56064 42e3ef SetErrorMode 50355 441394 50356 44139d 50355->50356 50357 4413ab WriteFile 50355->50357 50356->50357 50358 4413b6 50357->50358 50359 416410 50360 416422 50359->50360 50361 416462 GetClassInfoA 50360->50361 50379 408d2c 19 API calls 50360->50379 50362 41648e 50361->50362 50364 4164e9 50362->50364 50365 4164b0 RegisterClassA 50362->50365 50366 4164a0 UnregisterClassA 50362->50366 50370 416506 50364->50370 50373 416517 50364->50373 50365->50364 50368 4164d8 50365->50368 50366->50365 50367 41645d 50367->50361 50380 408cbc 50368->50380 50370->50364 50371 408cbc 5 API calls 50370->50371 50371->50373 50388 407544 50373->50388 50376 416530 50393 41a1e8 50376->50393 50378 41653a 50379->50367 50381 408cc8 50380->50381 50401 406dec LoadStringA 50381->50401 50386 403400 4 API calls 50387 408d0e 50386->50387 50387->50364 50389 407552 50388->50389 50390 407548 50388->50390 50392 418384 7 API calls 50389->50392 50391 402660 4 API calls 50390->50391 50391->50389 50392->50376 50394 41a213 50393->50394 50395 41a2af 50393->50395 50410 403520 50394->50410 50396 403400 4 API calls 50395->50396 50397 41a2c7 50396->50397 50397->50378 50399 41a26b 50400 41a2a3 CreateFontIndirectA 50399->50400 50400->50395 50402 4034e0 4 API calls 50401->50402 50403 406e19 50402->50403 50404 403450 50403->50404 50405 403454 50404->50405 50408 403464 50404->50408 50407 4034bc 4 API calls 50405->50407 50405->50408 50406 403490 50406->50386 50407->50408 50408->50406 50409 402660 4 API calls 50408->50409 50409->50406 50411 4034e0 4 API calls 50410->50411 50412 40352a 50411->50412 50412->50399 56065 491bf8 56066 491c32 56065->56066 56067 491c3e 56066->56067 56068 491c34 56066->56068 56070 491c4d 56067->56070 56071 491c76 56067->56071 56261 409098 MessageBeep 56068->56261 56073 446ff8 18 API calls 56070->56073 56078 491cae 56071->56078 56079 491c85 56071->56079 56072 403420 4 API calls 56074 49228a 56072->56074 56075 491c5a 56073->56075 56076 403400 4 API calls 56074->56076 56262 406bb0 56075->56262 56080 492292 56076->56080 56085 491cbd 56078->56085 56086 491ce6 56078->56086 56082 446ff8 18 API calls 56079->56082 56084 491c92 56082->56084 56270 406c00 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56084->56270 56088 446ff8 18 API calls 56085->56088 56093 491d0e 56086->56093 56094 491cf5 56086->56094 56091 491cca 56088->56091 56089 491c9d 56271 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56089->56271 56272 406c34 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56091->56272 56100 491d1d 56093->56100 56101 491d42 56093->56101 56274 407280 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetCurrentDirectoryA 56094->56274 56096 491cd5 56273 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56096->56273 56097 491cfd 56275 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56097->56275 56102 446ff8 18 API calls 56100->56102 56104 491d7a 56101->56104 56105 491d51 56101->56105 56103 491d2a 56102->56103 56106 4072a8 SetCurrentDirectoryA 56103->56106 56112 491d89 56104->56112 56113 491db2 56104->56113 56107 446ff8 18 API calls 56105->56107 56108 491d32 56106->56108 56109 491d5e 56107->56109 56276 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56108->56276 56111 42c804 5 API calls 56109->56111 56114 491d69 56111->56114 56115 446ff8 18 API calls 56112->56115 56118 491dfe 56113->56118 56119 491dc1 56113->56119 56277 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56114->56277 56117 491d96 56115->56117 56278 4071f8 8 API calls 56117->56278 56125 491e0d 56118->56125 56126 491e36 56118->56126 56121 446ff8 18 API calls 56119->56121 56124 491dd0 56121->56124 56122 491da1 56279 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56122->56279 56127 446ff8 18 API calls 56124->56127 56128 446ff8 18 API calls 56125->56128 56133 491e6e 56126->56133 56134 491e45 56126->56134 56129 491de1 56127->56129 56130 491e1a 56128->56130 56280 4918fc 8 API calls 56129->56280 56132 42c8a4 5 API calls 56130->56132 56136 491e25 56132->56136 56141 491e7d 56133->56141 56142 491ea6 56133->56142 56137 446ff8 18 API calls 56134->56137 56135 491ded 56281 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56135->56281 56282 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56136->56282 56140 491e52 56137->56140 56143 42c8cc 5 API calls 56140->56143 56144 446ff8 18 API calls 56141->56144 56149 491ede 56142->56149 56150 491eb5 56142->56150 56145 491e5d 56143->56145 56147 491e8a 56144->56147 56283 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56145->56283 56284 42c8fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 56147->56284 56156 491eed 56149->56156 56157 491f16 56149->56157 56151 446ff8 18 API calls 56150->56151 56153 491ec2 56151->56153 56152 491e95 56285 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56152->56285 56155 42c92c 5 API calls 56153->56155 56158 491ecd 56155->56158 56159 446ff8 18 API calls 56156->56159 56162 491f62 56157->56162 56163 491f25 56157->56163 56286 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56158->56286 56161 491efa 56159->56161 56164 42c954 5 API calls 56161->56164 56170 491f71 56162->56170 56171 491fb4 56162->56171 56165 446ff8 18 API calls 56163->56165 56166 491f05 56164->56166 56167 491f34 56165->56167 56287 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56166->56287 56169 446ff8 18 API calls 56167->56169 56173 491f45 56169->56173 56172 446ff8 18 API calls 56170->56172 56178 491fc3 56171->56178 56179 492027 56171->56179 56174 491f84 56172->56174 56288 42c4f8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 56173->56288 56176 446ff8 18 API calls 56174->56176 56180 491f95 56176->56180 56177 491f51 56289 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56177->56289 56182 446ff8 18 API calls 56178->56182 56186 492066 56179->56186 56187 492036 56179->56187 56290 491af4 12 API calls 56180->56290 56184 491fd0 56182->56184 56253 42c608 7 API calls 56184->56253 56185 491fa3 56291 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56185->56291 56197 4920a5 56186->56197 56198 492075 56186->56198 56190 446ff8 18 API calls 56187->56190 56194 492043 56190->56194 56191 491fde 56192 491fe2 56191->56192 56193 492017 56191->56193 56196 446ff8 18 API calls 56192->56196 56293 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56193->56293 56294 452908 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection DeleteFileA GetLastError 56194->56294 56201 491ff1 56196->56201 56206 4920e4 56197->56206 56207 4920b4 56197->56207 56202 446ff8 18 API calls 56198->56202 56200 492050 56295 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56200->56295 56254 452c80 56201->56254 56205 492082 56202->56205 56210 452770 5 API calls 56205->56210 56217 49212c 56206->56217 56218 4920f3 56206->56218 56211 446ff8 18 API calls 56207->56211 56208 492061 56233 491c39 56208->56233 56209 492001 56292 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56209->56292 56213 49208f 56210->56213 56214 4920c1 56211->56214 56296 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56213->56296 56297 452e10 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection RemoveDirectoryA GetLastError 56214->56297 56223 49213b 56217->56223 56224 492174 56217->56224 56220 446ff8 18 API calls 56218->56220 56219 4920ce 56298 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56219->56298 56222 492102 56220->56222 56225 446ff8 18 API calls 56222->56225 56226 446ff8 18 API calls 56223->56226 56229 492187 56224->56229 56235 49223d 56224->56235 56227 492113 56225->56227 56228 49214a 56226->56228 56231 447278 5 API calls 56227->56231 56230 446ff8 18 API calls 56228->56230 56232 446ff8 18 API calls 56229->56232 56236 49215b 56230->56236 56231->56233 56234 4921b4 56232->56234 56233->56072 56237 446ff8 18 API calls 56234->56237 56235->56233 56302 446f9c 18 API calls 56235->56302 56240 447278 5 API calls 56236->56240 56238 4921cb 56237->56238 56299 407ddc 7 API calls 56238->56299 56240->56233 56241 492256 56242 42e8c8 5 API calls 56241->56242 56243 49225e 56242->56243 56303 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56243->56303 56246 4921ed 56247 446ff8 18 API calls 56246->56247 56248 492201 56247->56248 56300 408508 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56248->56300 56250 49220c 56301 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56250->56301 56252 492218 56253->56191 56255 452724 2 API calls 56254->56255 56257 452c99 56255->56257 56256 452c9d 56256->56209 56257->56256 56258 452cc1 MoveFileA GetLastError 56257->56258 56259 452760 Wow64RevertWow64FsRedirection 56258->56259 56260 452ce7 56259->56260 56260->56209 56261->56233 56263 406bbf 56262->56263 56264 406bd8 56263->56264 56266 406be1 56263->56266 56265 403400 4 API calls 56264->56265 56267 406bdf 56265->56267 56268 403778 4 API calls 56266->56268 56269 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56267->56269 56268->56267 56269->56233 56270->56089 56271->56233 56272->56096 56273->56233 56274->56097 56275->56233 56276->56233 56277->56233 56278->56122 56279->56233 56280->56135 56281->56233 56282->56233 56283->56233 56284->56152 56285->56233 56286->56233 56287->56233 56288->56177 56289->56233 56290->56185 56291->56233 56292->56233 56293->56233 56294->56200 56295->56208 56296->56233 56297->56219 56298->56233 56299->56246 56300->56250 56301->56252 56302->56241 56303->56233 56304 40cc34 56307 406f10 WriteFile 56304->56307 56308 406f2d 56307->56308 50413 48095d 50418 451004 50413->50418 50415 480971 50428 47fa0c 50415->50428 50417 480995 50419 451011 50418->50419 50421 451065 50419->50421 50437 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50419->50437 50434 450e88 50421->50434 50425 45108d 50426 4510d0 50425->50426 50439 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50425->50439 50426->50415 50444 40b3c8 50428->50444 50430 47fa79 50430->50417 50433 47fa2e 50433->50430 50448 4069dc 50433->50448 50451 476994 50433->50451 50440 450e34 50434->50440 50437->50421 50438 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50438->50425 50439->50426 50441 450e46 50440->50441 50442 450e57 50440->50442 50443 450e4b InterlockedExchange 50441->50443 50442->50425 50442->50438 50443->50442 50445 40b3d3 50444->50445 50446 40b3f3 50445->50446 50467 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50445->50467 50446->50433 50449 402648 4 API calls 50448->50449 50450 4069e7 50449->50450 50450->50433 50463 4769c5 50451->50463 50465 476a0e 50451->50465 50452 476a59 50468 451294 50452->50468 50453 451294 21 API calls 50453->50463 50455 476a70 50457 403420 4 API calls 50455->50457 50459 476a8a 50457->50459 50458 4038a4 4 API calls 50458->50465 50459->50433 50461 403450 4 API calls 50461->50463 50462 403450 4 API calls 50462->50465 50463->50453 50463->50461 50463->50465 50474 4038a4 50463->50474 50483 403744 50463->50483 50464 403744 4 API calls 50464->50465 50465->50452 50465->50458 50465->50462 50465->50464 50466 451294 21 API calls 50465->50466 50466->50465 50467->50446 50469 4512af 50468->50469 50473 4512a4 50468->50473 50487 451238 21 API calls 50469->50487 50471 4512ba 50471->50473 50488 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50471->50488 50473->50455 50476 4038b1 50474->50476 50482 4038e1 50474->50482 50475 403400 4 API calls 50478 4038cb 50475->50478 50477 4038da 50476->50477 50479 4038bd 50476->50479 50480 4034bc 4 API calls 50477->50480 50478->50463 50489 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50479->50489 50480->50482 50482->50475 50484 40374a 50483->50484 50486 40375b 50483->50486 50485 4034bc 4 API calls 50484->50485 50484->50486 50485->50486 50486->50463 50487->50471 50488->50473 50489->50478 50490 41ee54 50491 41ee63 IsWindowVisible 50490->50491 50492 41ee99 50490->50492 50491->50492 50493 41ee6d IsWindowEnabled 50491->50493 50493->50492 50494 41ee77 50493->50494 50495 402648 4 API calls 50494->50495 50496 41ee81 EnableWindow 50495->50496 50496->50492 50497 46bb10 50498 46bb44 50497->50498 50529 46bfad 50497->50529 50502 46bbdc 50498->50502 50503 46bbba 50498->50503 50504 46bbcb 50498->50504 50505 46bb98 50498->50505 50506 46bba9 50498->50506 50515 46bb80 50498->50515 50499 403400 4 API calls 50501 46bfec 50499->50501 50510 403400 4 API calls 50501->50510 50820 46baa0 45 API calls 50502->50820 50553 46b6d0 50503->50553 50819 46b890 67 API calls 50504->50819 50817 46b420 47 API calls 50505->50817 50818 46b588 42 API calls 50506->50818 50514 46bff4 50510->50514 50513 46bb9e 50513->50515 50513->50529 50515->50529 50588 468c74 50515->50588 50516 46bc18 50516->50529 50532 46bc5b 50516->50532 50821 494da0 50516->50821 50519 46bd7e 50840 48358c 123 API calls 50519->50840 50520 414ae8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50520->50532 50523 46bd99 50523->50529 50524 42cbc0 6 API calls 50524->50532 50525 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50525->50532 50526 46af68 23 API calls 50526->50532 50529->50499 50530 46bdd7 50606 469f1c 50530->50606 50531 46af68 23 API calls 50531->50529 50532->50519 50532->50520 50532->50524 50532->50525 50532->50526 50532->50529 50532->50530 50549 46be9f 50532->50549 50591 468bb0 50532->50591 50599 46acd4 50532->50599 50744 483084 50532->50744 50857 46b1dc 19 API calls 50532->50857 50534 46be3d 50535 403450 4 API calls 50534->50535 50536 46be4d 50535->50536 50537 46bea9 50536->50537 50538 46be59 50536->50538 50543 46bf6b 50537->50543 50667 46af68 50537->50667 50841 457f1c 50538->50841 50542 457f1c 24 API calls 50542->50549 50549->50531 50858 46c424 50553->50858 50556 46b852 50558 403420 4 API calls 50556->50558 50560 46b86c 50558->50560 50559 46b71e 50561 46b83e 50559->50561 50865 455f84 13 API calls 50559->50865 50562 403400 4 API calls 50560->50562 50561->50556 50564 403450 4 API calls 50561->50564 50565 46b874 50562->50565 50564->50556 50566 403400 4 API calls 50565->50566 50567 46b87c 50566->50567 50567->50515 50568 46b801 50568->50556 50568->50561 50573 42cd48 7 API calls 50568->50573 50570 46b7a1 50570->50556 50570->50568 50875 42cd48 50570->50875 50572 46b73c 50572->50570 50866 466600 50572->50866 50575 46b817 50573->50575 50575->50561 50580 451458 4 API calls 50575->50580 50583 46b82e 50580->50583 50882 47efd0 42 API calls 50583->50882 50589 468bb0 19 API calls 50588->50589 50590 468c83 50589->50590 50590->50516 50592 468bdf 50591->50592 50593 4078f4 19 API calls 50592->50593 50596 468c20 50592->50596 50594 468c18 50593->50594 51135 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50594->51135 50597 403400 4 API calls 50596->50597 50598 468c38 50597->50598 50598->50532 50600 46ace5 50599->50600 50601 46ace0 50599->50601 51221 469a80 46 API calls 50600->51221 50603 46ace3 50601->50603 51136 46a740 50601->51136 50603->50532 50604 46aced 50604->50532 50607 403400 4 API calls 50606->50607 50608 469f4a 50607->50608 51598 47dd00 50608->51598 50610 469fad 50611 469fb1 50610->50611 50612 469fca 50610->50612 51605 466800 50611->51605 50614 469fbb 50612->50614 51608 494c90 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50612->51608 50616 46a25e 50614->50616 50619 46a154 50614->50619 50620 46a0e9 50614->50620 50617 403420 4 API calls 50616->50617 50622 46a288 50617->50622 50618 469fe6 50618->50614 50623 469fee 50618->50623 50621 403494 4 API calls 50619->50621 50624 403494 4 API calls 50620->50624 50626 46a161 50621->50626 50622->50534 50627 46af68 23 API calls 50623->50627 50625 46a0f6 50624->50625 50628 40357c 4 API calls 50625->50628 50629 40357c 4 API calls 50626->50629 50636 469ffb 50627->50636 50630 46a103 50628->50630 50631 46a16e 50629->50631 50632 40357c 4 API calls 50630->50632 50633 40357c 4 API calls 50631->50633 50634 46a110 50632->50634 50635 46a17b 50633->50635 50637 40357c 4 API calls 50634->50637 50638 40357c 4 API calls 50635->50638 50641 46a024 SetActiveWindow 50636->50641 50642 46a03c 50636->50642 50639 46a11d 50637->50639 50640 46a188 50638->50640 50643 466800 20 API calls 50639->50643 50644 40357c 4 API calls 50640->50644 50641->50642 51609 42f560 50642->51609 50645 46a12b 50643->50645 50646 46a196 50644->50646 50648 40357c 4 API calls 50645->50648 50649 414b18 4 API calls 50646->50649 50651 46a134 50648->50651 50652 46a152 50649->50652 50654 40357c 4 API calls 50651->50654 51626 466b38 50652->51626 50657 46a141 50654->50657 50656 46a08d 50659 46ade4 21 API calls 50656->50659 50658 414b18 4 API calls 50657->50658 50658->50652 50660 46a0bf 50659->50660 50660->50534 50668 468c74 19 API calls 50667->50668 50669 46af80 50668->50669 50670 46afa2 50669->50670 50671 4652cc 7 API calls 50669->50671 51811 4652cc 50670->51811 50671->50670 50675 46afba 50676 46ade4 21 API calls 50675->50676 50677 46aff2 50676->50677 50678 414b18 4 API calls 50677->50678 50679 46b006 50678->50679 50680 46b012 50679->50680 50681 46b03c 50679->50681 50682 414b18 4 API calls 50680->50682 50684 46b05b 50681->50684 50685 46b085 50681->50685 50683 46b026 50682->50683 50686 414b18 4 API calls 50683->50686 50687 414b18 4 API calls 50684->50687 50688 414b18 4 API calls 50685->50688 50691 46b06f 50687->50691 50689 46b099 50688->50689 50692 414b18 4 API calls 50689->50692 50745 46c424 48 API calls 50744->50745 50746 4830c7 50745->50746 50747 4830d0 50746->50747 52087 408be0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50746->52087 50749 414ae8 4 API calls 50747->50749 50750 4830e0 50749->50750 50751 403450 4 API calls 50750->50751 50752 4830ed 50751->50752 51889 46c77c 50752->51889 50755 4830fd 50757 414ae8 4 API calls 50755->50757 50758 48310d 50757->50758 50759 403450 4 API calls 50758->50759 50760 48311a 50759->50760 50761 469868 SendMessageA 50760->50761 50762 483133 50761->50762 50763 483184 50762->50763 52089 479e18 23 API calls 50762->52089 51918 4241dc IsIconic 50763->51918 50767 48319f SetActiveWindow 50768 4831b4 50767->50768 51926 4824b4 50768->51926 50817->50513 50818->50515 50819->50515 50820->50515 53742 43d9c8 50821->53742 50824 494dcc 53747 431bd0 50824->53747 50825 494e52 50826 494e61 50825->50826 53780 4945c8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50825->53780 50826->50532 50835 494e16 53778 49465c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50835->53778 50837 494e2a 53779 433dd0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50837->53779 50839 494e4a 50839->50532 50840->50523 50842 457f41 50841->50842 50843 457f61 50842->50843 50844 4078f4 19 API calls 50842->50844 50845 403400 4 API calls 50843->50845 50846 457f59 50844->50846 50847 457f76 50845->50847 50848 457d10 24 API calls 50846->50848 50847->50542 50848->50843 50857->50532 50883 46c4bc 50858->50883 50861 414ae8 50862 414af6 50861->50862 50863 4034e0 4 API calls 50862->50863 50864 414b03 50863->50864 50864->50559 50865->50572 50867 46661a 50866->50867 51086 4078f4 50867->51086 51129 42cccc 50875->51129 50878 451458 50879 451428 4 API calls 50878->50879 50880 451474 50879->50880 50881 47efd0 42 API calls 50880->50881 50881->50568 50882->50561 50884 414ae8 4 API calls 50883->50884 50885 46c4f0 50884->50885 50944 466898 50885->50944 50889 46c502 50890 46c511 50889->50890 50893 46c52a 50889->50893 51013 47efd0 42 API calls 50890->51013 50892 403420 4 API calls 50895 46b702 50892->50895 50894 46c571 50893->50894 50896 46c558 50893->50896 50897 46c5d6 50894->50897 50902 46c575 50894->50902 50895->50556 50895->50861 51014 47efd0 42 API calls 50896->51014 51016 42cb4c CharNextA 50897->51016 50900 46c5e5 50901 46c5e9 50900->50901 50906 46c602 50900->50906 51017 47efd0 42 API calls 50901->51017 50904 46c5bd 50902->50904 50902->50906 51015 47efd0 42 API calls 50904->51015 50905 46c626 51018 47efd0 42 API calls 50905->51018 50906->50905 50958 466a08 50906->50958 50911 46c525 50911->50892 50914 46c63f 50966 403778 50914->50966 50919 46c666 51019 466a94 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50919->51019 50920 46c697 50977 42c8cc 50920->50977 50923 46c679 50925 451458 4 API calls 50923->50925 50927 46c686 50925->50927 51020 47efd0 42 API calls 50927->51020 50949 4668b2 50944->50949 50945 406bb0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50945->50949 50947 42cbc0 6 API calls 50947->50949 50948 403450 4 API calls 50948->50949 50949->50945 50949->50947 50949->50948 50950 4668fb 50949->50950 51023 42caac 50949->51023 50951 403420 4 API calls 50950->50951 50952 466915 50951->50952 50953 414b18 50952->50953 50954 414ae8 4 API calls 50953->50954 50955 414b3c 50954->50955 50956 403400 4 API calls 50955->50956 50957 414b6d 50956->50957 50957->50889 50959 466a12 50958->50959 50960 466a25 50959->50960 51039 42cb3c CharNextA 50959->51039 50960->50905 50962 466a38 50960->50962 50963 466a42 50962->50963 50964 466a6f 50963->50964 51040 42cb3c CharNextA 50963->51040 50964->50905 50964->50914 50967 4037aa 50966->50967 50968 40377d 50966->50968 50969 403400 4 API calls 50967->50969 50968->50967 50970 403791 50968->50970 50972 4037a0 50969->50972 50971 4034e0 4 API calls 50970->50971 50971->50972 50973 42c99c 50972->50973 50974 42c9b2 50973->50974 50975 42c9f5 50973->50975 50974->50975 51041 42cb3c CharNextA 50974->51041 50975->50919 50975->50920 51042 42c674 50977->51042 51013->50911 51014->50911 51015->50911 51016->50900 51017->50911 51018->50911 51019->50923 51020->50911 51024 403494 4 API calls 51023->51024 51025 42cabc 51024->51025 51026 403744 4 API calls 51025->51026 51028 42caf2 51025->51028 51032 42c444 IsDBCSLeadByte 51025->51032 51026->51025 51029 42cb36 51028->51029 51033 4037b8 51028->51033 51038 42c444 IsDBCSLeadByte 51028->51038 51029->50949 51032->51025 51034 403744 4 API calls 51033->51034 51036 4037c6 51034->51036 51035 4037fc 51035->51028 51036->51035 51037 4038a4 4 API calls 51036->51037 51037->51035 51038->51028 51039->50959 51040->50963 51041->50974 51045 42c67c 51042->51045 51048 42c68d 51045->51048 51046 42c6f1 51048->51046 51051 42c6ab 51048->51051 51089 407908 51086->51089 51090 407925 51089->51090 51097 4075b8 51090->51097 51093 407951 51095 4034e0 4 API calls 51093->51095 51096 407903 51095->51096 51100 4075d3 51097->51100 51098 4075e5 51098->51093 51102 4069a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51098->51102 51100->51098 51103 4076da 19 API calls 51100->51103 51104 4075ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51100->51104 51102->51093 51103->51100 51104->51100 51130 42cbc0 6 API calls 51129->51130 51131 42ccee 51130->51131 51132 42ccf6 GetFileAttributesA 51131->51132 51133 403400 4 API calls 51132->51133 51134 42cd13 51133->51134 51134->50568 51134->50878 51135->50596 51138 46a787 51136->51138 51137 46abff 51140 46ac1a 51137->51140 51141 46ac4b 51137->51141 51138->51137 51139 46a842 51138->51139 51142 403494 4 API calls 51138->51142 51145 46a863 51139->51145 51146 46a8a4 51139->51146 51143 403494 4 API calls 51140->51143 51144 403494 4 API calls 51141->51144 51148 46a7c6 51142->51148 51149 46ac28 51143->51149 51150 46ac59 51144->51150 51147 403494 4 API calls 51145->51147 51154 403400 4 API calls 51146->51154 51151 46a871 51147->51151 51152 414ae8 4 API calls 51148->51152 51248 46915c 12 API calls 51149->51248 51249 46915c 12 API calls 51150->51249 51156 414ae8 4 API calls 51151->51156 51157 46a7e7 51152->51157 51158 46a8a2 51154->51158 51160 46a892 51156->51160 51222 403634 51157->51222 51178 46a988 51158->51178 51228 469868 51158->51228 51159 46ac36 51162 403400 4 API calls 51159->51162 51163 403634 4 API calls 51160->51163 51166 46ac7c 51162->51166 51163->51158 51171 403400 4 API calls 51166->51171 51167 46aa10 51169 403400 4 API calls 51167->51169 51174 46aa0e 51169->51174 51170 46a8c4 51175 46a902 51170->51175 51176 46a8ca 51170->51176 51172 46ac84 51171->51172 51177 403420 4 API calls 51172->51177 51243 469ca4 43 API calls 51174->51243 51179 403400 4 API calls 51175->51179 51180 403494 4 API calls 51176->51180 51182 46ac91 51177->51182 51178->51167 51183 46a9cf 51178->51183 51184 46a900 51179->51184 51181 46a8d8 51180->51181 51234 47c26c 51181->51234 51182->50603 51188 403494 4 API calls 51183->51188 51237 469b5c 51184->51237 51192 46a9dd 51188->51192 51190 46aa39 51199 46aa44 51190->51199 51200 46aa9a 51190->51200 51191 46a8f0 51194 403634 4 API calls 51191->51194 51195 414ae8 4 API calls 51192->51195 51194->51184 51197 46a9fe 51195->51197 51201 403634 4 API calls 51197->51201 51198 46a929 51204 46a934 51198->51204 51205 46a98a 51198->51205 51203 403494 4 API calls 51199->51203 51202 403400 4 API calls 51200->51202 51201->51174 51208 46aaa2 51202->51208 51210 46aa52 51203->51210 51207 403494 4 API calls 51204->51207 51206 403400 4 API calls 51205->51206 51206->51178 51212 46a942 51207->51212 51220 46ab4b 51208->51220 51244 494c90 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51208->51244 51210->51208 51214 403634 4 API calls 51210->51214 51216 46aa98 51210->51216 51211 46aac5 51211->51220 51245 494f3c 18 API calls 51211->51245 51212->51178 51215 403634 4 API calls 51212->51215 51214->51210 51215->51212 51216->51208 51218 46abec 51247 429144 SendMessageA SendMessageA 51218->51247 51246 4290f4 SendMessageA 51220->51246 51221->50604 51223 40363c 51222->51223 51224 4034bc 4 API calls 51223->51224 51225 40364f 51224->51225 51226 403450 4 API calls 51225->51226 51227 403677 51226->51227 51250 42a040 SendMessageA 51228->51250 51230 469877 51231 469897 51230->51231 51251 42a040 SendMessageA 51230->51251 51231->51170 51233 469887 51233->51170 51252 47c2b4 51234->51252 51241 469b89 51237->51241 51238 469beb 51239 403400 4 API calls 51238->51239 51240 469c00 51239->51240 51240->51198 51241->51238 51597 469ae0 43 API calls 51241->51597 51243->51190 51244->51211 51245->51220 51246->51218 51247->51137 51248->51159 51249->51159 51250->51230 51251->51233 51253 403494 4 API calls 51252->51253 51260 47c2e7 51253->51260 51254 47c3f9 51255 403420 4 API calls 51254->51255 51256 47c289 51255->51256 51256->51191 51258 403778 4 API calls 51258->51260 51260->51254 51260->51258 51263 4037b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51260->51263 51264 47b100 51260->51264 51508 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51260->51508 51509 403800 51260->51509 51513 42c97c CharPrevA 51260->51513 51263->51260 51265 47b152 51264->51265 51266 47b130 51264->51266 51267 47b172 51265->51267 51268 47b160 51265->51268 51266->51265 51518 47a030 19 API calls 51266->51518 51271 47b1d5 51267->51271 51272 47b180 51267->51272 51269 403494 4 API calls 51268->51269 51323 47b16d 51269->51323 51281 47b1f6 51271->51281 51282 47b1e3 51271->51282 51274 47b1af 51272->51274 51275 47b189 51272->51275 51273 403400 4 API calls 51276 47baf8 51273->51276 51278 47b1c2 51274->51278 51520 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51274->51520 51277 47b19c 51275->51277 51519 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51275->51519 51280 403400 4 API calls 51276->51280 51284 403494 4 API calls 51277->51284 51279 403494 4 API calls 51278->51279 51279->51323 51286 47bb00 51280->51286 51288 47b217 51281->51288 51289 47b204 51281->51289 51287 403494 4 API calls 51282->51287 51284->51323 51286->51260 51287->51323 51291 47b267 51288->51291 51292 47b225 51288->51292 51290 403494 4 API calls 51289->51290 51290->51323 51299 47b275 51291->51299 51300 47b288 51291->51300 51293 47b241 51292->51293 51294 47b22e 51292->51294 51296 47b254 51293->51296 51521 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51293->51521 51295 403494 4 API calls 51294->51295 51295->51323 51298 403494 4 API calls 51296->51298 51298->51323 51301 403494 4 API calls 51299->51301 51302 47b296 51300->51302 51303 47b2a9 51300->51303 51301->51323 51304 403494 4 API calls 51302->51304 51305 47b2b7 51303->51305 51306 47b2ca 51303->51306 51304->51323 51307 403494 4 API calls 51305->51307 51308 47b2eb 51306->51308 51309 47b2d8 51306->51309 51307->51323 51311 47b327 51308->51311 51312 47b2f9 51308->51312 51310 403494 4 API calls 51309->51310 51310->51323 51317 47b335 51311->51317 51322 47b364 51311->51322 51313 47b315 51312->51313 51314 47b302 51312->51314 51316 47c26c 43 API calls 51313->51316 51315 403494 4 API calls 51314->51315 51315->51323 51316->51323 51318 47b351 51317->51318 51319 47b33e 51317->51319 51324 47b372 51322->51324 51325 47b3a0 51322->51325 51323->51273 51508->51260 51510 40382f 51509->51510 51511 403804 51509->51511 51510->51260 51512 4038a4 4 API calls 51511->51512 51512->51510 51513->51260 51518->51266 51519->51277 51520->51278 51521->51296 51597->51241 51599 47dd56 51598->51599 51600 47dd19 51598->51600 51599->50610 51630 455d0c 51600->51630 51604 47dd6d 51604->50610 51749 466714 51605->51749 51608->50618 51610 42f56c 51609->51610 51611 42f58f GetActiveWindow GetFocus 51610->51611 51612 41eea4 2 API calls 51611->51612 51613 42f5a6 51612->51613 51614 42f5c3 51613->51614 51615 42f5b3 RegisterClassA 51613->51615 51616 42f652 SetFocus 51614->51616 51617 42f5d1 CreateWindowExA 51614->51617 51615->51614 51618 403400 4 API calls 51616->51618 51617->51616 51619 42f604 51617->51619 51620 42f66e 51618->51620 51780 42427c 51619->51780 51625 494f3c 18 API calls 51620->51625 51622 42f62c 51623 42f634 CreateWindowExA 51622->51623 51623->51616 51624 42f64a ShowWindow 51623->51624 51624->51616 51625->50656 51786 44b514 51626->51786 51631 455d1d 51630->51631 51632 455d21 51631->51632 51633 455d2a 51631->51633 51656 455a10 51632->51656 51664 455af0 29 API calls 51633->51664 51636 455d27 51636->51599 51637 47d970 51636->51637 51642 47da6c 51637->51642 51644 47d9b0 51637->51644 51638 403420 4 API calls 51639 47db4f 51638->51639 51639->51604 51649 47dabd 51642->51649 51652 47da0f 51642->51652 51719 479630 51642->51719 51644->51642 51645 47da18 51644->51645 51648 47c26c 43 API calls 51644->51648 51644->51652 51693 479770 51644->51693 51704 4798d4 51644->51704 51645->51644 51650 47c26c 43 API calls 51645->51650 51655 47da59 51645->51655 51708 42c92c 51645->51708 51713 42c954 51645->51713 51718 47d67c 52 API calls 51645->51718 51646 47c26c 43 API calls 51646->51649 51647 454100 20 API calls 51647->51649 51648->51644 51649->51642 51649->51646 51649->51647 51649->51655 51650->51645 51652->51638 51655->51652 51665 42de1c 51656->51665 51658 455a2d 51659 455a7b 51658->51659 51668 455944 51658->51668 51659->51636 51662 455944 6 API calls 51663 455a5c RegCloseKey 51662->51663 51663->51636 51664->51636 51666 42de27 51665->51666 51667 42de2d RegOpenKeyExA 51665->51667 51666->51667 51667->51658 51673 42dd58 51668->51673 51670 45596c 51671 403420 4 API calls 51670->51671 51672 4559f6 51671->51672 51672->51662 51676 42dc00 51673->51676 51677 42dc26 RegQueryValueExA 51676->51677 51682 42dc49 51677->51682 51692 42dc6b 51677->51692 51678 403400 4 API calls 51680 42dd37 51678->51680 51679 42dc63 51681 403400 4 API calls 51679->51681 51680->51670 51681->51692 51682->51679 51683 4034e0 4 API calls 51682->51683 51684 403744 4 API calls 51682->51684 51682->51692 51683->51682 51685 42dca0 RegQueryValueExA 51684->51685 51685->51677 51686 42dcbc 51685->51686 51687 4038a4 4 API calls 51686->51687 51686->51692 51688 42dcfe 51687->51688 51689 42dd10 51688->51689 51691 403744 4 API calls 51688->51691 51690 403450 4 API calls 51689->51690 51690->51692 51691->51689 51692->51678 51694 479786 51693->51694 51695 479782 51693->51695 51696 403450 4 API calls 51694->51696 51695->51644 51697 479793 51696->51697 51698 4797b3 51697->51698 51699 479799 51697->51699 51701 479630 19 API calls 51698->51701 51700 479630 19 API calls 51699->51700 51702 4797af 51700->51702 51701->51702 51703 403400 4 API calls 51702->51703 51703->51695 51706 4798e0 51704->51706 51705 4798fb 51705->51644 51706->51705 51731 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51706->51731 51732 42c79c 51708->51732 51711 403778 4 API calls 51712 42c94e 51711->51712 51712->51645 51714 42c79c IsDBCSLeadByte 51713->51714 51715 42c964 51714->51715 51716 403778 4 API calls 51715->51716 51717 42c975 51716->51717 51717->51645 51718->51645 51720 47964b 51719->51720 51723 47967c 51720->51723 51730 47970a 51720->51730 51744 4794e4 19 API calls 51720->51744 51721 4796a1 51727 4796c2 51721->51727 51746 4794e4 19 API calls 51721->51746 51723->51721 51745 4794e4 19 API calls 51723->51745 51726 479702 51738 479368 51726->51738 51727->51726 51727->51730 51747 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51727->51747 51730->51642 51731->51705 51733 42c67c IsDBCSLeadByte 51732->51733 51735 42c7b1 51733->51735 51734 42c7fb 51734->51711 51735->51734 51737 42c444 IsDBCSLeadByte 51735->51737 51737->51735 51739 4793a3 51738->51739 51740 403450 4 API calls 51739->51740 51741 4793c8 51740->51741 51748 477a58 19 API calls 51741->51748 51743 479409 51743->51730 51744->51723 51745->51721 51746->51727 51747->51726 51748->51743 51750 403494 4 API calls 51749->51750 51751 466742 51750->51751 51766 42dbc8 51751->51766 51754 42dbc8 5 API calls 51755 466766 51754->51755 51756 466600 19 API calls 51755->51756 51757 466770 51756->51757 51758 42dbc8 5 API calls 51757->51758 51759 46677f 51758->51759 51769 466678 51759->51769 51762 42dbc8 5 API calls 51763 466798 51762->51763 51764 403400 4 API calls 51763->51764 51765 4667ad 51764->51765 51765->50614 51773 42db10 51766->51773 51770 466698 51769->51770 51771 4078f4 19 API calls 51770->51771 51772 4666e2 51771->51772 51772->51762 51774 42dbbb 51773->51774 51775 42db30 51773->51775 51774->51754 51775->51774 51776 4037b8 4 API calls 51775->51776 51778 403800 4 API calls 51775->51778 51779 42c444 IsDBCSLeadByte 51775->51779 51776->51775 51778->51775 51779->51775 51781 4242ae 51780->51781 51782 42428e GetWindowTextA 51780->51782 51784 403494 4 API calls 51781->51784 51783 4034e0 4 API calls 51782->51783 51785 4242ac 51783->51785 51784->51785 51785->51622 51789 44b38c 51786->51789 51790 44b3bf 51789->51790 51791 414ae8 4 API calls 51790->51791 51792 44b3d2 51791->51792 51793 44b3ff GetDC 51792->51793 51794 40357c 4 API calls 51792->51794 51795 41a1e8 5 API calls 51793->51795 51794->51793 51796 44b41f SelectObject 51795->51796 51797 44b430 51796->51797 51800 44b0c0 51797->51800 51801 44b0d7 51800->51801 51814 4652d7 51811->51814 51812 4653b2 51822 46708c 51812->51822 51813 46536a 51813->51812 51840 4185b8 7 API calls 51813->51840 51814->51812 51817 465327 51814->51817 51834 421a1c 51814->51834 51817->51813 51818 465361 51817->51818 51819 46536c 51817->51819 51820 421a1c 7 API calls 51818->51820 51821 421a1c 7 API calls 51819->51821 51820->51813 51821->51813 51823 4670bc 51822->51823 51824 46709d 51822->51824 51823->50675 51825 414b18 4 API calls 51824->51825 51826 4670ab 51825->51826 51827 414b18 4 API calls 51826->51827 51827->51823 51835 421a74 51834->51835 51837 421a2a 51834->51837 51835->51817 51836 421a59 51836->51835 51841 421d28 SetFocus GetFocus 51836->51841 51837->51836 51838 408cbc 5 API calls 51837->51838 51838->51836 51840->51812 51841->51835 51890 46c7a5 51889->51890 51891 414ae8 4 API calls 51890->51891 51906 46c7f2 51890->51906 51892 46c7bb 51891->51892 52096 466924 6 API calls 51892->52096 51893 403420 4 API calls 51895 46c89c 51893->51895 51895->50755 52088 408be0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51895->52088 51896 46c7c3 51897 414b18 4 API calls 51896->51897 51898 46c7d1 51897->51898 51899 46c7de 51898->51899 51901 46c7f7 51898->51901 52097 47efd0 42 API calls 51899->52097 51902 46c80f 51901->51902 51904 466a08 CharNextA 51901->51904 52098 47efd0 42 API calls 51902->52098 51905 46c80b 51904->51905 51905->51902 51907 46c825 51905->51907 51906->51893 51908 46c841 51907->51908 51909 46c82b 51907->51909 51911 42c99c CharNextA 51908->51911 52099 47efd0 42 API calls 51909->52099 51912 46c84e 51911->51912 51912->51906 52100 466a94 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51912->52100 51914 46c865 51915 451458 4 API calls 51914->51915 51916 46c872 51915->51916 52101 47efd0 42 API calls 51916->52101 51919 4241ed SetActiveWindow 51918->51919 51923 424223 51918->51923 52102 42364c 51919->52102 51923->50767 51923->50768 51924 42420a 51924->51923 51925 42421d SetFocus 51924->51925 51925->51923 51927 482505 51926->51927 51928 4824d7 51926->51928 51930 475bd0 51927->51930 52115 494cec 18 API calls 51928->52115 52116 457d10 51930->52116 52089->50763 52096->51896 52097->51906 52098->51906 52099->51906 52100->51914 52101->51906 52111 4235f8 SystemParametersInfoA 52102->52111 52105 423665 ShowWindow 52107 423670 52105->52107 52108 423677 52105->52108 52114 423628 SystemParametersInfoA 52107->52114 52110 423b14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 52108->52110 52110->51924 52112 423616 52111->52112 52112->52105 52113 423628 SystemParametersInfoA 52112->52113 52113->52105 52114->52108 52115->51927 52117 457e44 52116->52117 52118 457d3c 52116->52118 52119 457e95 52117->52119 52592 45757c 6 API calls 52117->52592 52588 457a0c GetSystemTimeAsFileTime FileTimeToSystemTime 52118->52588 52122 403400 4 API calls 52119->52122 52124 457eaa 52122->52124 52123 457d44 52125 4078f4 19 API calls 52123->52125 52137 4072a8 52124->52137 52126 457db5 52125->52126 52589 457d00 20 API calls 52126->52589 52138 403738 52137->52138 52588->52123 52592->52119 53781 431eec 53742->53781 53744 43d9f2 53745 403400 4 API calls 53744->53745 53746 43da76 53745->53746 53746->50824 53746->50825 53748 431bd6 53747->53748 53749 402648 4 API calls 53748->53749 53750 431c06 53749->53750 53751 4947f8 53750->53751 53752 4948cd 53751->53752 53753 494812 53751->53753 53758 494910 53752->53758 53753->53752 53755 433d6c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53753->53755 53757 403450 4 API calls 53753->53757 53786 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53753->53786 53787 431ca0 53753->53787 53755->53753 53757->53753 53759 49492c 53758->53759 53795 433d6c 53759->53795 53761 494931 53762 431ca0 4 API calls 53761->53762 53763 49493c 53762->53763 53764 43d594 53763->53764 53765 43d5c1 53764->53765 53766 43d5b3 53764->53766 53765->50835 53766->53765 53767 43d63d 53766->53767 53771 447084 4 API calls 53766->53771 53774 43d6f7 53767->53774 53798 447084 53767->53798 53769 43d688 53804 43dd50 53769->53804 53771->53766 53772 43d8fd 53772->53765 53824 447024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53772->53824 53774->53772 53775 43d8de 53774->53775 53822 447024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53774->53822 53823 447024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53775->53823 53778->50837 53779->50839 53780->50826 53782 403494 4 API calls 53781->53782 53784 431efb 53782->53784 53783 431f25 53783->53744 53784->53783 53785 403744 4 API calls 53784->53785 53785->53784 53786->53753 53788 431cc0 53787->53788 53789 431cae 53787->53789 53791 431ce2 53788->53791 53794 431c40 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53788->53794 53793 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53789->53793 53791->53753 53793->53788 53794->53791 53796 402648 4 API calls 53795->53796 53797 433d7b 53796->53797 53797->53761 53799 4470a3 53798->53799 53800 4470aa 53798->53800 53825 446e30 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53799->53825 53802 431ca0 4 API calls 53800->53802 53803 4470ba 53802->53803 53803->53769 53805 43dd6c 53804->53805 53810 43dd99 53804->53810 53806 402660 4 API calls 53805->53806 53805->53810 53806->53805 53807 43ddce 53807->53774 53809 43fea5 53809->53807 53810->53807 53810->53809 53811 43c938 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53810->53811 53813 433b18 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53810->53813 53816 446e30 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53810->53816 53818 433d18 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53810->53818 53819 436650 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53810->53819 53820 431c40 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53810->53820 53821 447024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53810->53821 53826 4396e0 53810->53826 53832 436e4c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53810->53832 53833 43dc48 18 API calls 53810->53833 53834 433d34 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53810->53834 53811->53810 53813->53810 53816->53810 53818->53810 53819->53810 53820->53810 53821->53810 53822->53774 53823->53772 53824->53772 53825->53800 53832->53810 53833->53810 53834->53810 53838 41fb58 53839 41fb61 53838->53839 53842 41fdfc 53839->53842 53841 41fb6e 53843 41feee 53842->53843 53844 41fe13 53842->53844 53843->53841 53844->53843 53863 41f9bc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 53844->53863 53846 41fe49 53847 41fe73 53846->53847 53848 41fe4d 53846->53848 53873 41f9bc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 53847->53873 53864 41fb9c 53848->53864 53852 41fe81 53854 41fe85 53852->53854 53855 41feab 53852->53855 53853 41fb9c 10 API calls 53862 41fe71 53853->53862 53856 41fb9c 10 API calls 53854->53856 53857 41fb9c 10 API calls 53855->53857 53858 41fe97 53856->53858 53859 41febd 53857->53859 53861 41fb9c 10 API calls 53858->53861 53860 41fb9c 10 API calls 53859->53860 53860->53862 53861->53862 53862->53841 53863->53846 53865 41fbb7 53864->53865 53866 41fbcd 53865->53866 53867 41f93c 4 API calls 53865->53867 53874 41f93c 53866->53874 53867->53866 53869 41fc15 53870 41fc38 SetScrollInfo 53869->53870 53882 41fa9c 53870->53882 53873->53852 53875 4181e0 53874->53875 53876 41f959 GetWindowLongA 53875->53876 53877 41f996 53876->53877 53878 41f976 53876->53878 53894 41f8c8 GetWindowLongA GetSystemMetrics GetSystemMetrics 53877->53894 53893 41f8c8 GetWindowLongA GetSystemMetrics GetSystemMetrics 53878->53893 53881 41f982 53881->53869 53883 41faaa 53882->53883 53884 41fab2 53882->53884 53883->53853 53885 41faf1 53884->53885 53886 41fae1 53884->53886 53892 41faef 53884->53892 53896 417e48 IsWindowVisible ScrollWindow SetWindowPos 53885->53896 53895 417e48 IsWindowVisible ScrollWindow SetWindowPos 53886->53895 53887 41fb31 GetScrollPos 53887->53883 53890 41fb3c 53887->53890 53891 41fb4b SetScrollPos 53890->53891 53891->53883 53892->53887 53893->53881 53894->53881 53895->53892 53896->53892 53897 420598 53898 4205ab 53897->53898 53918 415b30 53898->53918 53900 4206f2 53901 420709 53900->53901 53925 4146d4 KiUserCallbackDispatcher 53900->53925 53905 420720 53901->53905 53926 414718 KiUserCallbackDispatcher 53901->53926 53902 420651 53923 420848 20 API calls 53902->53923 53903 4205e6 53903->53900 53903->53902 53911 420642 MulDiv 53903->53911 53907 420742 53905->53907 53927 420060 12 API calls 53905->53927 53909 42066a 53909->53900 53924 420060 12 API calls 53909->53924 53922 41a304 LocalAlloc TlsSetValue TlsGetValue TlsGetValue DeleteObject 53911->53922 53914 420687 53915 4206a3 MulDiv 53914->53915 53916 4206c6 53914->53916 53915->53916 53916->53900 53917 4206cf MulDiv 53916->53917 53917->53900 53919 415b42 53918->53919 53928 414470 53919->53928 53921 415b5a 53921->53903 53922->53902 53923->53909 53924->53914 53925->53901 53926->53905 53927->53907 53929 41448a 53928->53929 53932 410458 53929->53932 53931 4144a0 53931->53921 53935 40dca4 53932->53935 53934 41045e 53934->53931 53936 40dd06 53935->53936 53937 40dcb7 53935->53937 53942 40dd14 53936->53942 53940 40dd14 19 API calls 53937->53940 53941 40dce1 53940->53941 53941->53934 53943 40dd24 53942->53943 53945 40dd3a 53943->53945 53954 40e09c 53943->53954 53970 40d5e0 53943->53970 53973 40df4c 53945->53973 53948 40d5e0 5 API calls 53949 40dd42 53948->53949 53949->53948 53950 40ddae 53949->53950 53976 40db60 53949->53976 53951 40df4c 5 API calls 53950->53951 53953 40dd10 53951->53953 53953->53934 53990 40e96c 53954->53990 53956 403778 4 API calls 53958 40e0d7 53956->53958 53957 40e18d 53959 40e1b7 53957->53959 53960 40e1a8 53957->53960 53958->53956 53958->53957 54053 40d774 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53958->54053 54054 40e080 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53958->54054 54050 40ba24 53959->54050 53999 40e3c0 53960->53999 53966 40e1b5 53967 403400 4 API calls 53966->53967 53968 40e25c 53967->53968 53968->53943 53971 40ea08 5 API calls 53970->53971 53972 40d5ea 53971->53972 53972->53943 54087 40d4bc 53973->54087 54096 40df54 53976->54096 53979 40e96c 5 API calls 53980 40db9e 53979->53980 53981 40e96c 5 API calls 53980->53981 53982 40dba9 53981->53982 53983 40dbc4 53982->53983 53984 40dbbb 53982->53984 53989 40dbc1 53982->53989 54103 40d9d8 53983->54103 54106 40dac8 19 API calls 53984->54106 53987 403420 4 API calls 53988 40dc8f 53987->53988 53988->53949 53989->53987 54056 40d780 53990->54056 53993 4034e0 4 API calls 53994 40e98f 53993->53994 53995 403744 4 API calls 53994->53995 53996 40e996 53995->53996 53997 40d780 5 API calls 53996->53997 53998 40e9a4 53997->53998 53998->53958 54000 40e3ec 53999->54000 54002 40e3f6 53999->54002 54061 40d440 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54000->54061 54003 40e511 54002->54003 54004 40e495 54002->54004 54005 40e4f6 54002->54005 54006 40e576 54002->54006 54007 40e438 54002->54007 54008 40e4d9 54002->54008 54009 40e47a 54002->54009 54010 40e4bb 54002->54010 54021 40e45c 54002->54021 54013 40d764 5 API calls 54003->54013 54069 40de24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54004->54069 54074 40e890 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54005->54074 54017 40d764 5 API calls 54006->54017 54062 40d764 54007->54062 54072 40e9a8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54008->54072 54068 40d818 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54009->54068 54071 40dde4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54010->54071 54022 40e519 54013->54022 54016 403400 4 API calls 54023 40e5eb 54016->54023 54024 40e57e 54017->54024 54020 40e4a0 54070 40d470 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54020->54070 54021->54016 54030 40e523 54022->54030 54031 40e51d 54022->54031 54023->53966 54032 40e582 54024->54032 54033 40e59b 54024->54033 54025 40e4e4 54073 409d38 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54025->54073 54027 40e461 54067 40ded8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54027->54067 54028 40e444 54065 40de24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54028->54065 54075 40ea08 54030->54075 54038 40e521 54031->54038 54039 40e53c 54031->54039 54041 40ea08 5 API calls 54032->54041 54081 40de24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54033->54081 54079 40de24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54038->54079 54042 40ea08 5 API calls 54039->54042 54041->54021 54044 40e544 54042->54044 54043 40e44f 54066 40e26c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54043->54066 54078 40d8a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54044->54078 54047 40e566 54080 40e2d4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54047->54080 54082 40b9d0 54050->54082 54053->53958 54054->53958 54055 40d774 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54055->53966 54058 40d78b 54056->54058 54057 40d7c5 54057->53993 54058->54057 54060 40d7cc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54058->54060 54060->54058 54061->54002 54063 40ea08 5 API calls 54062->54063 54064 40d76e 54063->54064 54064->54027 54064->54028 54065->54043 54066->54021 54067->54021 54068->54021 54069->54020 54070->54021 54071->54021 54072->54025 54073->54021 54074->54021 54076 40d780 5 API calls 54075->54076 54077 40ea15 54076->54077 54077->54021 54078->54021 54079->54047 54080->54021 54081->54021 54083 40b9e2 54082->54083 54084 40ba07 54082->54084 54083->54084 54086 40ba84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54083->54086 54084->53966 54084->54055 54086->54084 54088 40ea08 5 API calls 54087->54088 54090 40d4c9 54088->54090 54089 40d4dc 54089->53949 54090->54089 54094 40eb0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54090->54094 54092 40d4d7 54095 40d458 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54092->54095 54094->54092 54095->54089 54097 40d764 5 API calls 54096->54097 54098 40df6b 54097->54098 54099 40ea08 5 API calls 54098->54099 54102 40db93 54098->54102 54100 40df78 54099->54100 54100->54102 54107 40ded8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54100->54107 54102->53979 54108 40ab7c 19 API calls 54103->54108 54105 40da00 54105->53989 54106->53989 54107->54102 54108->54105 56309 41363c SetWindowLongA GetWindowLongA 56310 413699 SetPropA SetPropA 56309->56310 56311 41367b GetWindowLongA 56309->56311 56316 41f39c 56310->56316 56311->56310 56312 41368a SetWindowLongA 56311->56312 56312->56310 56321 423c0c 56316->56321 56415 423a84 56316->56415 56422 415270 56316->56422 56317 4136e9 56324 423c42 56321->56324 56340 423c63 56324->56340 56429 423b68 56324->56429 56325 423cec 56327 423cf3 56325->56327 56328 423d27 56325->56328 56326 423c8d 56329 423c93 56326->56329 56330 423d50 56326->56330 56335 423cf9 56327->56335 56373 423fb1 56327->56373 56331 423d32 56328->56331 56332 42409a IsIconic 56328->56332 56336 423cc5 56329->56336 56337 423c98 56329->56337 56333 423d62 56330->56333 56334 423d6b 56330->56334 56338 4240d6 56331->56338 56339 423d3b 56331->56339 56332->56340 56344 4240ae GetFocus 56332->56344 56341 423d78 56333->56341 56342 423d69 56333->56342 56436 424194 11 API calls 56334->56436 56345 423f13 SendMessageA 56335->56345 56346 423d07 56335->56346 56336->56340 56364 423cde 56336->56364 56365 423e3f 56336->56365 56347 423df6 56337->56347 56348 423c9e 56337->56348 56450 424850 WinHelpA PostMessageA 56338->56450 56350 4240ed 56339->56350 56374 423cc0 56339->56374 56340->56317 56351 4241dc 11 API calls 56341->56351 56437 423b84 NtdllDefWindowProc_A 56342->56437 56344->56340 56352 4240bf 56344->56352 56345->56340 56346->56340 56346->56374 56395 423f56 56346->56395 56441 423b84 NtdllDefWindowProc_A 56347->56441 56353 423ca7 56348->56353 56354 423e1e PostMessageA 56348->56354 56362 4240f6 56350->56362 56363 42410b 56350->56363 56351->56340 56449 41eff4 GetCurrentThreadId EnumThreadWindows 56352->56449 56359 423cb0 56353->56359 56360 423ea5 56353->56360 56442 423b84 NtdllDefWindowProc_A 56354->56442 56368 423cb9 56359->56368 56369 423dce IsIconic 56359->56369 56370 423eae 56360->56370 56371 423edf 56360->56371 56361 423e39 56361->56340 56372 4244d4 5 API calls 56362->56372 56451 42452c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 56363->56451 56364->56374 56375 423e0b 56364->56375 56433 423b84 NtdllDefWindowProc_A 56365->56433 56367 4240c6 56367->56340 56379 4240ce SetFocus 56367->56379 56368->56374 56380 423d91 56368->56380 56382 423dea 56369->56382 56383 423dde 56369->56383 56444 423b14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 56370->56444 56434 423b84 NtdllDefWindowProc_A 56371->56434 56372->56340 56373->56340 56389 423fd7 IsWindowEnabled 56373->56389 56374->56340 56435 423b84 NtdllDefWindowProc_A 56374->56435 56377 424178 12 API calls 56375->56377 56377->56340 56378 423e45 56386 423e83 56378->56386 56387 423e61 56378->56387 56379->56340 56380->56340 56438 422c4c ShowWindow PostMessageA PostQuitMessage 56380->56438 56440 423b84 NtdllDefWindowProc_A 56382->56440 56439 423bc0 15 API calls 56383->56439 56396 423a84 6 API calls 56386->56396 56443 423b14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 56387->56443 56388 423eb6 56398 423ec8 56388->56398 56405 41ef58 6 API calls 56388->56405 56389->56340 56399 423fe5 56389->56399 56392 423ee5 56393 423efd 56392->56393 56400 41eea4 2 API calls 56392->56400 56401 423a84 6 API calls 56393->56401 56395->56340 56403 423f78 IsWindowEnabled 56395->56403 56404 423e8b PostMessageA 56396->56404 56445 423b84 NtdllDefWindowProc_A 56398->56445 56408 423fec IsWindowVisible 56399->56408 56400->56393 56401->56340 56402 423e69 PostMessageA 56402->56340 56403->56340 56407 423f86 56403->56407 56404->56340 56405->56398 56446 412310 7 API calls 56407->56446 56408->56340 56410 423ffa GetFocus 56408->56410 56411 4181e0 56410->56411 56412 42400f SetFocus 56411->56412 56447 415240 56412->56447 56416 423a94 56415->56416 56418 423b0d 56415->56418 56417 423a9a EnumWindows 56416->56417 56416->56418 56417->56418 56419 423ab6 GetWindow GetWindowLongA 56417->56419 56452 423a1c GetWindow 56417->56452 56418->56317 56420 423ad5 56419->56420 56420->56418 56421 423b01 SetWindowPos 56420->56421 56421->56418 56421->56420 56423 41527d 56422->56423 56424 4152e3 56423->56424 56425 4152d8 56423->56425 56428 4152e1 56423->56428 56455 424b8c 13 API calls 56424->56455 56425->56428 56456 41505c 46 API calls 56425->56456 56428->56317 56430 423b72 56429->56430 56431 423b7d 56429->56431 56430->56431 56432 408720 7 API calls 56430->56432 56431->56325 56431->56326 56432->56431 56433->56378 56434->56392 56435->56340 56436->56340 56437->56340 56438->56340 56439->56340 56440->56340 56441->56340 56442->56361 56443->56402 56444->56388 56445->56340 56446->56340 56448 41525b SetFocus 56447->56448 56448->56340 56449->56367 56450->56361 56451->56361 56453 423a3d GetWindowLongA 56452->56453 56454 423a49 56452->56454 56453->56454 56455->56428 56456->56428 56457 4809f7 56458 480a00 56457->56458 56460 480a2b 56457->56460 56459 480a1d 56458->56459 56458->56460 56829 476c50 189 API calls 56459->56829 56461 480a6a 56460->56461 56831 47f4a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56460->56831 56462 480a8e 56461->56462 56465 480a81 56461->56465 56466 480a83 56461->56466 56471 480aca 56462->56471 56472 480aac 56462->56472 56475 47f4e8 42 API calls 56465->56475 56833 47f57c 42 API calls 56466->56833 56467 480a22 56467->56460 56830 408be0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56467->56830 56468 480a5d 56832 47f50c 42 API calls 56468->56832 56836 47f33c 24 API calls 56471->56836 56476 480ac1 56472->56476 56834 47f50c 42 API calls 56472->56834 56475->56462 56835 47f33c 24 API calls 56476->56835 56479 480ac8 56480 480ada 56479->56480 56481 480ae0 56479->56481 56482 480ade 56480->56482 56486 47f4e8 42 API calls 56480->56486 56481->56482 56484 47f4e8 42 API calls 56481->56484 56583 47c66c 56482->56583 56484->56482 56486->56482 56584 42d898 GetWindowsDirectoryA 56583->56584 56585 47c690 56584->56585 56586 403450 4 API calls 56585->56586 56587 47c69d 56586->56587 56588 42d8c4 GetSystemDirectoryA 56587->56588 56589 47c6a5 56588->56589 56590 403450 4 API calls 56589->56590 56591 47c6b2 56590->56591 56592 42d8f0 6 API calls 56591->56592 56593 47c6ba 56592->56593 56594 403450 4 API calls 56593->56594 56595 47c6c7 56594->56595 56596 47c6d0 56595->56596 56597 47c6ec 56595->56597 56868 42d208 56596->56868 56599 403400 4 API calls 56597->56599 56601 47c6ea 56599->56601 56603 47c731 56601->56603 56605 42c8cc 5 API calls 56601->56605 56602 403450 4 API calls 56602->56601 56848 47c4f4 56603->56848 56607 47c70c 56605->56607 56609 403450 4 API calls 56607->56609 56608 403450 4 API calls 56610 47c74d 56608->56610 56611 47c719 56609->56611 56612 47c76b 56610->56612 56613 4035c0 4 API calls 56610->56613 56611->56603 56615 403450 4 API calls 56611->56615 56614 47c4f4 8 API calls 56612->56614 56613->56612 56616 47c77a 56614->56616 56615->56603 56617 403450 4 API calls 56616->56617 56618 47c787 56617->56618 56620 47c7af 56618->56620 56621 42c3fc 5 API calls 56618->56621 56619 47c816 56624 47c8de 56619->56624 56625 47c836 SHGetKnownFolderPath 56619->56625 56620->56619 56622 47c4f4 8 API calls 56620->56622 56623 47c79d 56621->56623 56626 47c7c7 56622->56626 56629 4035c0 4 API calls 56623->56629 56629->56620 56829->56467 56831->56468 56832->56461 56833->56462 56834->56476 56835->56479 56836->56479 56849 42de1c RegOpenKeyExA 56848->56849 56850 47c51a 56849->56850 56851 47c540 56850->56851 56852 47c51e 56850->56852 56853 403400 4 API calls 56851->56853 56854 42dd4c 6 API calls 56852->56854 56855 47c547 56853->56855 56856 47c52a 56854->56856 56855->56608 56857 47c535 RegCloseKey 56856->56857 56858 403400 4 API calls 56856->56858 56857->56855 56858->56857 56869 4038a4 4 API calls 56868->56869 56870 42d21b 56869->56870 56871 42d232 GetEnvironmentVariableA 56870->56871 56875 42d245 56870->56875 56880 42dbd0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56870->56880 56871->56870 56872 42d23e 56871->56872 56874 403400 4 API calls 56872->56874 56874->56875 56875->56602 56880->56870
                                                                                                        Strings
                                                                                                        • Installing the file., xrefs: 00470F09
                                                                                                        • Time stamp of existing file: (failed to read), xrefs: 00470A37
                                                                                                        • Existing file is protected by Windows File Protection. Skipping., xrefs: 00470DEC
                                                                                                        • Stripped read-only attribute., xrefs: 00470EC7
                                                                                                        • Time stamp of existing file: %s, xrefs: 00470A2B
                                                                                                        • Uninstaller requires administrator: %s, xrefs: 0047118F
                                                                                                        • Non-default bitness: 64-bit, xrefs: 004708AF
                                                                                                        • Dest file is protected by Windows File Protection., xrefs: 004708ED
                                                                                                        • Same version. Skipping., xrefs: 00470CE5
                                                                                                        • Installing into GAC, xrefs: 00471714
                                                                                                        • Failed to read existing file's SHA-1 hash. Proceeding., xrefs: 00470CD0
                                                                                                        • Incrementing shared file count (32-bit)., xrefs: 004715A5
                                                                                                        • User opted not to strip the existing file's read-only attribute. Skipping., xrefs: 00470E96
                                                                                                        • Non-default bitness: 32-bit, xrefs: 004708BB
                                                                                                        • Failed to strip read-only attribute., xrefs: 00470ED3
                                                                                                        • Time stamp of our file: %s, xrefs: 0047099B
                                                                                                        • Existing file is a newer version. Skipping., xrefs: 00470C02
                                                                                                        • Existing file's SHA-1 hash matches our file. Skipping., xrefs: 00470CB5
                                                                                                        • InUn, xrefs: 0047115F
                                                                                                        • -- File entry --, xrefs: 004706FB
                                                                                                        • .tmp, xrefs: 00470FB7
                                                                                                        • Skipping due to "onlyifdoesntexist" flag., xrefs: 004709CE
                                                                                                        • Will register the file (a type library) later., xrefs: 00471513
                                                                                                        • Incrementing shared file count (64-bit)., xrefs: 0047158C
                                                                                                        • Time stamp of our file: (failed to read), xrefs: 004709A7
                                                                                                        • Couldn't read time stamp. Skipping., xrefs: 00470D35
                                                                                                        • , xrefs: 00470BCF, 00470DA0, 00470E1E
                                                                                                        • Dest filename: %s, xrefs: 00470894
                                                                                                        • @, xrefs: 004707B0
                                                                                                        • Will register the file (a DLL/OCX) later., xrefs: 0047151F
                                                                                                        • Version of existing file: (none), xrefs: 00470CFA
                                                                                                        • Same time stamp. Skipping., xrefs: 00470D55
                                                                                                        • User opted not to overwrite the existing file. Skipping., xrefs: 00470E4D
                                                                                                        • Version of existing file: %u.%u.%u.%u, xrefs: 00470B7C
                                                                                                        • Version of our file: (none), xrefs: 00470AFC
                                                                                                        • Dest file exists., xrefs: 004709BB
                                                                                                        • Existing file has a later time stamp. Skipping., xrefs: 00470DCF
                                                                                                        • Existing file's SHA-1 hash is different from our file. Proceeding., xrefs: 00470CC4
                                                                                                        • Version of our file: %u.%u.%u.%u, xrefs: 00470AF0
                                                                                                        • Skipping due to "onlyifdestfileexists" flag., xrefs: 00470EFA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: $-- File entry --$.tmp$@$Couldn't read time stamp. Skipping.$Dest file exists.$Dest file is protected by Windows File Protection.$Dest filename: %s$Existing file has a later time stamp. Skipping.$Existing file is a newer version. Skipping.$Existing file is protected by Windows File Protection. Skipping.$Existing file's SHA-1 hash is different from our file. Proceeding.$Existing file's SHA-1 hash matches our file. Skipping.$Failed to read existing file's SHA-1 hash. Proceeding.$Failed to strip read-only attribute.$InUn$Incrementing shared file count (32-bit).$Incrementing shared file count (64-bit).$Installing into GAC$Installing the file.$Non-default bitness: 32-bit$Non-default bitness: 64-bit$Same time stamp. Skipping.$Same version. Skipping.$Skipping due to "onlyifdestfileexists" flag.$Skipping due to "onlyifdoesntexist" flag.$Stripped read-only attribute.$Time stamp of existing file: %s$Time stamp of existing file: (failed to read)$Time stamp of our file: %s$Time stamp of our file: (failed to read)$Uninstaller requires administrator: %s$User opted not to overwrite the existing file. Skipping.$User opted not to strip the existing file's read-only attribute. Skipping.$Version of existing file: %u.%u.%u.%u$Version of existing file: (none)$Version of our file: %u.%u.%u.%u$Version of our file: (none)$Will register the file (a DLL/OCX) later.$Will register the file (a type library) later.
                                                                                                        • API String ID: 0-4021121268
                                                                                                        • Opcode ID: cebd1a573a13cfb1480ab73f2a07467b13e4d984594641078933206a2f2f5451
                                                                                                        • Instruction ID: 04e5041402f80353ef90c659d92e8d378e84d4fed116f8838aecbbc27e5febe3
                                                                                                        • Opcode Fuzzy Hash: cebd1a573a13cfb1480ab73f2a07467b13e4d984594641078933206a2f2f5451
                                                                                                        • Instruction Fuzzy Hash: 31927574A0424CDFDB21DFA9C445BDDBBB5AF05304F1480ABE848A7392D7789E49CB19

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1578 42e09c-42e0ad 1579 42e0b8-42e0dd AllocateAndInitializeSid 1578->1579 1580 42e0af-42e0b3 1578->1580 1581 42e287-42e28f 1579->1581 1582 42e0e3-42e100 GetVersion 1579->1582 1580->1581 1583 42e102-42e117 GetModuleHandleA GetProcAddress 1582->1583 1584 42e119-42e11b 1582->1584 1583->1584 1585 42e142-42e15c GetCurrentThread OpenThreadToken 1584->1585 1586 42e11d-42e12b CheckTokenMembership 1584->1586 1589 42e193-42e1bb GetTokenInformation 1585->1589 1590 42e15e-42e168 GetLastError 1585->1590 1587 42e131-42e13d 1586->1587 1588 42e269-42e27f FreeSid 1586->1588 1587->1588 1591 42e1d6-42e1fa call 402648 GetTokenInformation 1589->1591 1592 42e1bd-42e1c5 GetLastError 1589->1592 1593 42e174-42e187 GetCurrentProcess OpenProcessToken 1590->1593 1594 42e16a-42e16f call 4031bc 1590->1594 1605 42e208-42e210 1591->1605 1606 42e1fc-42e206 call 4031bc * 2 1591->1606 1592->1591 1595 42e1c7-42e1d1 call 4031bc * 2 1592->1595 1593->1589 1598 42e189-42e18e call 4031bc 1593->1598 1594->1581 1595->1581 1598->1581 1607 42e212-42e213 1605->1607 1608 42e243-42e261 call 402660 CloseHandle 1605->1608 1606->1581 1611 42e215-42e228 EqualSid 1607->1611 1615 42e22a-42e237 1611->1615 1616 42e23f-42e241 1611->1616 1615->1616 1619 42e239-42e23d 1615->1619 1616->1608 1616->1611 1619->1608
                                                                                                        APIs
                                                                                                        • AllocateAndInitializeSid.ADVAPI32(00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0D6
                                                                                                        • GetVersion.KERNEL32(00000000,0042E280,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0F3
                                                                                                        • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E280,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E10C
                                                                                                        • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042E112
                                                                                                        • CheckTokenMembership.KERNELBASE(00000000,00000000,?,00000000,0042E280,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E127
                                                                                                        • FreeSid.ADVAPI32(00000000,0042E287,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E27A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressAllocateCheckFreeHandleInitializeMembershipModuleProcTokenVersion
                                                                                                        • String ID: CheckTokenMembership$advapi32.dll
                                                                                                        • API String ID: 2252812187-1888249752
                                                                                                        • Opcode ID: a9f409996ddfe82e0213da269ff1de212d34eb3ec341ac20085b7d7d2472ef68
                                                                                                        • Instruction ID: e5677345bf142a8b1d9111380f95962c8bb8cf61ba8e960ca5c3fd0f127139eb
                                                                                                        • Opcode Fuzzy Hash: a9f409996ddfe82e0213da269ff1de212d34eb3ec341ac20085b7d7d2472ef68
                                                                                                        • Instruction Fuzzy Hash: E351A271B44215EEEB10EAE69C42BBF77ACEB09704F9404BBB901F7281D57C99018B79

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1642 4502c0-4502cd 1643 4502d3-4502e0 GetVersion 1642->1643 1644 45037c-450386 1642->1644 1643->1644 1645 4502e6-4502fc LoadLibraryA 1643->1645 1645->1644 1646 4502fe-450377 GetProcAddress * 6 1645->1646 1646->1644
                                                                                                        APIs
                                                                                                        • GetVersion.KERNEL32(00480B52), ref: 004502D3
                                                                                                        • LoadLibraryA.KERNEL32(Rstrtmgr.dll,00480B52), ref: 004502EB
                                                                                                        • GetProcAddress.KERNEL32(6E080000,RmStartSession), ref: 00450309
                                                                                                        • GetProcAddress.KERNEL32(6E080000,RmRegisterResources), ref: 0045031E
                                                                                                        • GetProcAddress.KERNEL32(6E080000,RmGetList), ref: 00450333
                                                                                                        • GetProcAddress.KERNEL32(6E080000,RmShutdown), ref: 00450348
                                                                                                        • GetProcAddress.KERNEL32(6E080000,RmRestart), ref: 0045035D
                                                                                                        • GetProcAddress.KERNEL32(6E080000,RmEndSession), ref: 00450372
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc$LibraryLoadVersion
                                                                                                        • String ID: RmEndSession$RmGetList$RmRegisterResources$RmRestart$RmShutdown$RmStartSession$Rstrtmgr.dll
                                                                                                        • API String ID: 1968650500-3419246398
                                                                                                        • Opcode ID: 2681632e5309952c30eea3f8c2bf2722b4339596373eceda0d07b93e3cd0d7e4
                                                                                                        • Instruction ID: c77cef2ad5653e61b65a4477cbb73d0d56cf7b8a9d174f96be3e9b6947252677
                                                                                                        • Opcode Fuzzy Hash: 2681632e5309952c30eea3f8c2bf2722b4339596373eceda0d07b93e3cd0d7e4
                                                                                                        • Instruction Fuzzy Hash: B211F7B4510301DBD710FB61BF45A2E36E9E728315B08063FE804961A2CB7C4844CF8C

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1790 423c0c-423c40 1791 423c42-423c43 1790->1791 1792 423c74-423c8b call 423b68 1790->1792 1793 423c45-423c61 call 40b24c 1791->1793 1798 423cec-423cf1 1792->1798 1799 423c8d 1792->1799 1819 423c63-423c6b 1793->1819 1820 423c70-423c72 1793->1820 1800 423cf3 1798->1800 1801 423d27-423d2c 1798->1801 1802 423c93-423c96 1799->1802 1803 423d50-423d60 1799->1803 1809 423fb1-423fb9 1800->1809 1810 423cf9-423d01 1800->1810 1804 423d32-423d35 1801->1804 1805 42409a-4240a8 IsIconic 1801->1805 1811 423cc5-423cc8 1802->1811 1812 423c98 1802->1812 1807 423d62-423d67 1803->1807 1808 423d6b-423d73 call 424194 1803->1808 1813 4240d6-4240eb call 424850 1804->1813 1814 423d3b-423d3c 1804->1814 1815 424152-42415a 1805->1815 1824 4240ae-4240b9 GetFocus 1805->1824 1821 423d78-423d80 call 4241dc 1807->1821 1822 423d69-423d8c call 423b84 1807->1822 1808->1815 1809->1815 1816 423fbf-423fca call 4181e0 1809->1816 1825 423f13-423f3a SendMessageA 1810->1825 1826 423d07-423d0c 1810->1826 1817 423da9-423db0 1811->1817 1818 423cce-423ccf 1811->1818 1827 423df6-423e06 call 423b84 1812->1827 1828 423c9e-423ca1 1812->1828 1813->1815 1831 423d42-423d45 1814->1831 1832 4240ed-4240f4 1814->1832 1829 424171-424177 1815->1829 1816->1815 1878 423fd0-423fdf call 4181e0 IsWindowEnabled 1816->1878 1817->1815 1841 423db6-423dbd 1817->1841 1842 423cd5-423cd8 1818->1842 1843 423f3f-423f46 1818->1843 1819->1829 1820->1792 1820->1793 1821->1815 1822->1815 1824->1815 1836 4240bf-4240c8 call 41eff4 1824->1836 1825->1815 1844 423d12-423d13 1826->1844 1845 42404a-424055 1826->1845 1827->1815 1837 423ca7-423caa 1828->1837 1838 423e1e-423e3a PostMessageA call 423b84 1828->1838 1847 424120-424127 1831->1847 1848 423d4b 1831->1848 1858 4240f6-424109 call 4244d4 1832->1858 1859 42410b-42411e call 42452c 1832->1859 1836->1815 1891 4240ce-4240d4 SetFocus 1836->1891 1855 423cb0-423cb3 1837->1855 1856 423ea5-423eac 1837->1856 1838->1815 1841->1815 1861 423dc3-423dc9 1841->1861 1862 423cde-423ce1 1842->1862 1863 423e3f-423e5f call 423b84 1842->1863 1843->1815 1851 423f4c-423f51 call 404e54 1843->1851 1864 424072-42407d 1844->1864 1865 423d19-423d1c 1844->1865 1845->1815 1849 42405b-42406d 1845->1849 1882 42413a-424149 1847->1882 1883 424129-424138 1847->1883 1866 42414b-42414c call 423b84 1848->1866 1849->1815 1851->1815 1873 423cb9-423cba 1855->1873 1874 423dce-423ddc IsIconic 1855->1874 1875 423eae-423ec1 call 423b14 1856->1875 1876 423edf-423ef0 call 423b84 1856->1876 1858->1815 1859->1815 1861->1815 1879 423ce7 1862->1879 1880 423e0b-423e19 call 424178 1862->1880 1906 423e83-423ea0 call 423a84 PostMessageA 1863->1906 1907 423e61-423e7e call 423b14 PostMessageA 1863->1907 1864->1815 1867 424083-424095 1864->1867 1884 423d22 1865->1884 1885 423f56-423f5e 1865->1885 1903 424151 1866->1903 1867->1815 1892 423cc0 1873->1892 1893 423d91-423d99 1873->1893 1899 423dea-423df1 call 423b84 1874->1899 1900 423dde-423de5 call 423bc0 1874->1900 1922 423ed3-423eda call 423b84 1875->1922 1923 423ec3-423ecd call 41ef58 1875->1923 1916 423ef2-423ef8 call 41eea4 1876->1916 1917 423f06-423f0e call 423a84 1876->1917 1878->1815 1924 423fe5-423ff4 call 4181e0 IsWindowVisible 1878->1924 1879->1866 1880->1815 1882->1815 1883->1815 1884->1866 1885->1815 1890 423f64-423f6b 1885->1890 1890->1815 1908 423f71-423f80 call 4181e0 IsWindowEnabled 1890->1908 1891->1815 1892->1866 1893->1815 1909 423d9f-423da4 call 422c4c 1893->1909 1899->1815 1900->1815 1903->1815 1906->1815 1907->1815 1908->1815 1937 423f86-423f9c call 412310 1908->1937 1909->1815 1935 423efd-423f00 1916->1935 1917->1815 1922->1815 1923->1922 1924->1815 1942 423ffa-424045 GetFocus call 4181e0 SetFocus call 415240 SetFocus 1924->1942 1935->1917 1937->1815 1946 423fa2-423fac 1937->1946 1942->1815 1946->1815
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 22958418fcb5307417e2cb8c5b21c835fdc4d5c2778e3f26f52eb9817f6a2da5
                                                                                                        • Instruction ID: afb4f91cf4018cf9acc1c9974f14325182323c15c0e0405bd0f9b005e596376e
                                                                                                        • Opcode Fuzzy Hash: 22958418fcb5307417e2cb8c5b21c835fdc4d5c2778e3f26f52eb9817f6a2da5
                                                                                                        • Instruction Fuzzy Hash: 03E1AE31700124EFDB04DF69E989AADB7B5FB54300FA440AAE5559B352C73CEE81DB09

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 2133 4673a4-4673ba 2134 4673c4-46747b call 49577c call 402b30 * 6 2133->2134 2135 4673bc-4673bf call 402d30 2133->2135 2152 46747d-4674a4 call 41463c 2134->2152 2153 4674b8-4674d1 2134->2153 2135->2134 2157 4674a6 2152->2157 2158 4674a9-4674b3 call 4145fc 2152->2158 2159 4674d3-4674fa call 41461c 2153->2159 2160 46750e-46751c call 495a84 2153->2160 2157->2158 2158->2153 2166 4674ff-467509 call 4145dc 2159->2166 2167 4674fc 2159->2167 2168 46751e-46752d call 4958cc 2160->2168 2169 46752f-467531 call 4959f0 2160->2169 2166->2160 2167->2166 2174 467536-467589 call 4953e0 call 41a3d0 * 2 2168->2174 2169->2174 2181 46759a-4675af call 451458 call 414b18 2174->2181 2182 46758b-467598 call 414b18 2174->2182 2187 4675b4-4675bb 2181->2187 2182->2187 2189 467603-467a89 call 49581c call 495b40 call 41461c * 3 call 4146bc call 4145dc * 3 call 460bfc call 460c14 call 460c20 call 460c68 call 460bfc call 460c14 call 460c20 call 460c68 call 460c14 call 460c68 LoadBitmapA call 41d6b0 call 460c38 call 460c50 call 467180 call 468c94 call 466800 call 40357c call 414b18 call 466b38 call 466b40 call 466800 call 40357c * 2 call 414b18 call 468c94 call 466800 call 414b18 call 466b38 call 466b40 call 414b18 * 2 call 468c94 call 414b18 * 2 call 466b38 call 4145fc call 466b38 call 4145fc call 468c94 call 414b18 call 466b38 call 466b40 call 468c94 call 414b18 call 466b38 call 4145fc * 2 call 414b18 call 466b38 call 4145fc 2187->2189 2190 4675bd-4675fe call 4146bc call 414700 call 420f98 call 420fc4 call 420b68 call 420b94 2187->2190 2320 467ae5-467afe call 414a44 * 2 2189->2320 2321 467a8b-467ae3 call 4145fc call 414b18 call 466b38 call 4145fc 2189->2321 2190->2189 2329 467b03-467bb4 call 466800 call 468c94 call 466800 call 414b18 call 495b40 call 466b38 2320->2329 2321->2329 2347 467bb6-467bd1 2329->2347 2348 467bee-467e24 call 466800 call 414b18 call 495b50 * 2 call 42e8c0 call 4145fc call 466b38 call 4145fc call 4181e0 call 42ed38 call 414b18 call 49581c call 495b40 call 41461c call 466800 call 414b18 call 466b38 call 4145fc call 466800 call 468c94 call 466800 call 414b18 call 466b38 call 4145fc call 466b40 call 466800 call 414b18 call 466b38 2329->2348 2349 467bd6-467be9 call 4145fc 2347->2349 2350 467bd3 2347->2350 2409 467e26-467e2f 2348->2409 2410 467e65-467f1e call 466800 call 468c94 call 466800 call 414b18 call 495b40 call 466b38 2348->2410 2349->2348 2350->2349 2409->2410 2411 467e31-467e60 call 414a44 call 466b40 2409->2411 2428 467f20-467f3b 2410->2428 2429 467f58-468379 call 466800 call 414b18 call 495b50 * 2 call 42e8c0 call 4145fc call 466b38 call 4145fc call 414b18 call 49581c call 495b40 call 41461c call 414b18 call 466800 call 468c94 call 466800 call 414b18 call 466b38 call 466b40 call 42bbd0 call 495b50 call 44e8b0 call 466800 call 468c94 call 466800 call 468c94 call 466800 call 468c94 * 2 call 414b18 call 466b38 call 466b40 call 468c94 call 4953e0 call 41a3d0 call 466800 call 40357c call 414b18 call 466b38 call 4145fc call 414b18 * 2 call 495b50 call 403494 call 40357c * 2 call 414b18 2410->2429 2411->2410 2431 467f40-467f53 call 4145fc 2428->2431 2432 467f3d 2428->2432 2528 46839d-4683a4 2429->2528 2529 46837b-468398 call 44ffdc call 450138 2429->2529 2431->2429 2432->2431 2531 4683a6-4683c3 call 44ffdc call 450138 2528->2531 2532 4683c8-4683cf 2528->2532 2529->2528 2531->2532 2535 4683f3-468439 call 4181e0 GetSystemMenu AppendMenuA call 403738 AppendMenuA call 468d88 2532->2535 2536 4683d1-4683ee call 44ffdc call 450138 2532->2536 2549 468453 2535->2549 2550 46843b-468442 2535->2550 2536->2535 2553 468455-468464 2549->2553 2551 468444-46844d 2550->2551 2552 46844f-468451 2550->2552 2551->2549 2551->2552 2552->2553 2554 468466-46846d 2553->2554 2555 46847e 2553->2555 2557 46846f-468478 2554->2557 2558 46847a-46847c 2554->2558 2556 468480-46849a 2555->2556 2559 468543-46854a 2556->2559 2560 4684a0-4684a9 2556->2560 2557->2555 2557->2558 2558->2556 2563 468550-468573 call 47c26c call 403450 2559->2563 2564 4685dd-4685eb call 414b18 2559->2564 2561 468504-46853e call 414b18 * 3 2560->2561 2562 4684ab-468502 call 47c26c call 414b18 call 47c26c call 414b18 call 47c26c call 414b18 2560->2562 2561->2559 2562->2559 2587 468584-468598 call 403494 2563->2587 2588 468575-468582 call 47c440 2563->2588 2572 4685f0-4685f9 2564->2572 2576 4685ff-468617 call 429fd8 2572->2576 2577 468709-468738 call 42b96c call 44e83c 2572->2577 2589 46868e-468692 2576->2589 2590 468619-46861d 2576->2590 2606 4687e6-4687ea 2577->2606 2607 46873e-468742 2577->2607 2602 4685aa-4685db call 42c804 call 42cbc0 call 403494 call 414b18 2587->2602 2603 46859a-4685a5 call 403494 2587->2603 2588->2602 2596 468694-46869d 2589->2596 2597 4686e2-4686e6 2589->2597 2598 46861f-468659 call 40b24c call 47c26c 2590->2598 2596->2597 2604 46869f-4686aa 2596->2604 2609 4686fa-468704 call 42a05c 2597->2609 2610 4686e8-4686f8 call 42a05c 2597->2610 2663 46865b-468662 2598->2663 2664 468688-46868c 2598->2664 2602->2572 2603->2602 2604->2597 2614 4686ac-4686b0 2604->2614 2617 4687ec-4687f3 2606->2617 2618 468869-46886d 2606->2618 2616 468744-468756 call 40b24c 2607->2616 2609->2577 2610->2577 2622 4686b2-4686d5 call 40b24c call 406ac4 2614->2622 2641 468788-4687bf call 47c26c call 44cb0c 2616->2641 2642 468758-468786 call 47c26c call 44cbdc 2616->2642 2617->2618 2625 4687f5-4687fc 2617->2625 2626 4688d6-4688df 2618->2626 2627 46886f-468886 call 40b24c 2618->2627 2673 4686d7-4686da 2622->2673 2674 4686dc-4686e0 2622->2674 2625->2618 2636 4687fe-468809 2625->2636 2634 4688e1-4688f9 call 40b24c call 4699fc 2626->2634 2635 4688fe-468913 call 466ee0 call 466c5c 2626->2635 2656 4688c6-4688d4 call 4699fc 2627->2656 2657 468888-4688c4 call 40b24c call 4699fc * 2 call 46989c 2627->2657 2634->2635 2682 468965-46896f call 414a44 2635->2682 2683 468915-468938 call 42a040 call 40b24c 2635->2683 2636->2635 2644 46880f-468813 2636->2644 2684 4687c4-4687c8 2641->2684 2642->2684 2655 468815-46882b call 40b24c 2644->2655 2679 46885e-468862 2655->2679 2680 46882d-468859 call 42a05c call 4699fc call 46989c 2655->2680 2656->2635 2657->2635 2663->2664 2675 468664-468676 call 406ac4 2663->2675 2664->2589 2664->2598 2673->2597 2674->2597 2674->2622 2675->2664 2701 468678-468682 2675->2701 2679->2655 2694 468864 2679->2694 2680->2635 2696 468974-468993 call 414a44 2682->2696 2715 468943-468952 call 414a44 2683->2715 2716 46893a-468941 2683->2716 2692 4687d3-4687d5 2684->2692 2693 4687ca-4687d1 2684->2693 2700 4687dc-4687e0 2692->2700 2693->2692 2693->2700 2694->2635 2711 468995-4689b8 call 42a040 call 469b5c 2696->2711 2712 4689bd-4689e0 call 47c26c call 403450 2696->2712 2700->2606 2700->2616 2701->2664 2706 468684 2701->2706 2706->2664 2711->2712 2730 4689e2-4689eb 2712->2730 2731 4689fc-468a05 2712->2731 2715->2696 2716->2715 2720 468954-468963 call 414a44 2716->2720 2720->2696 2730->2731 2734 4689ed-4689fa call 47c440 2730->2734 2732 468a07-468a19 call 403684 2731->2732 2733 468a1b-468a2b call 403494 2731->2733 2732->2733 2742 468a2d-468a38 call 403494 2732->2742 2741 468a3d-468a54 call 414b18 2733->2741 2734->2741 2746 468a56-468a5d 2741->2746 2747 468a8a-468a94 call 414a44 2741->2747 2742->2741 2749 468a5f-468a68 2746->2749 2750 468a6a-468a74 call 42b0e4 2746->2750 2752 468a99-468abe call 403400 * 3 2747->2752 2749->2750 2753 468a79-468a88 call 414a44 2749->2753 2750->2753 2753->2752
                                                                                                        APIs
                                                                                                          • Part of subcall function 004958CC: GetWindowRect.USER32(00000000), ref: 004958E2
                                                                                                        • LoadBitmapA.USER32(00400000,STOPIMAGE), ref: 00467773
                                                                                                          • Part of subcall function 0041D6B0: GetObjectA.GDI32(?,00000018,0046778D), ref: 0041D6DB
                                                                                                          • Part of subcall function 00467180: SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 00467223
                                                                                                          • Part of subcall function 00467180: ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467249
                                                                                                          • Part of subcall function 00467180: ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 004672A0
                                                                                                          • Part of subcall function 00466B40: KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467828,00000000,00000000,00000000,0000000C,00000000), ref: 00466B58
                                                                                                          • Part of subcall function 00495B50: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 00495B5A
                                                                                                          • Part of subcall function 0042ED38: GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDA8
                                                                                                          • Part of subcall function 0042ED38: SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDC5
                                                                                                          • Part of subcall function 0049581C: GetDC.USER32(00000000), ref: 0049583E
                                                                                                          • Part of subcall function 0049581C: SelectObject.GDI32(?,00000000), ref: 00495864
                                                                                                          • Part of subcall function 0049581C: ReleaseDC.USER32(00000000,?), ref: 004958B5
                                                                                                          • Part of subcall function 00495B40: MulDiv.KERNEL32(0000004B,?,00000006), ref: 00495B4A
                                                                                                        • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,0226FC68,02271960,?,?,02271990,?,?,022719E0,?), ref: 004683FD
                                                                                                        • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 0046840E
                                                                                                        • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00468426
                                                                                                          • Part of subcall function 0042A05C: SendMessageA.USER32(00000000,0000014E,00000000,00000000), ref: 0042A072
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Menu$AppendExtractIconObject$AddressAutoBitmapCallbackCompleteDispatcherFileInfoLoadMessageProcRectReleaseSelectSendSystemUserWindow
                                                                                                        • String ID: $(Default)$STOPIMAGE$%H
                                                                                                        • API String ID: 3231140908-2624782221
                                                                                                        • Opcode ID: cd61aa661d0cbe35304877807cea77ca0702e96d718fc27b010991c92e86a780
                                                                                                        • Instruction ID: 1a3196d4b4984e68f3522cc8585b165e0004af585c118fa25862355e2bbb38c0
                                                                                                        • Opcode Fuzzy Hash: cd61aa661d0cbe35304877807cea77ca0702e96d718fc27b010991c92e86a780
                                                                                                        • Instruction Fuzzy Hash: 95F2C6346005248FCB00EF69D9D9F9973F1BF49304F1582BAE5049B36ADB74AC46CB9A
                                                                                                        APIs
                                                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,004750F2,?,?,0049C1E0,00000000), ref: 00474FE1
                                                                                                        • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,004750F2,?,?,0049C1E0,00000000), ref: 004750BE
                                                                                                        • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,004750F2,?,?,0049C1E0,00000000), ref: 004750CC
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Find$File$CloseFirstNext
                                                                                                        • String ID: unins$unins???.*
                                                                                                        • API String ID: 3541575487-1009660736
                                                                                                        • Opcode ID: 490a2bf6f62b777b12f8bb075fd261ec892e44da2a65e6c72c5e66397d3a6b60
                                                                                                        • Instruction ID: 191fa049ef1442540897bd6b232d6b1da598bf4afdbbee48782243349675ce5a
                                                                                                        • Opcode Fuzzy Hash: 490a2bf6f62b777b12f8bb075fd261ec892e44da2a65e6c72c5e66397d3a6b60
                                                                                                        • Instruction Fuzzy Hash: 95315074A00548ABCB10EB65CD81BDEB7A9DF45304F50C0B6E40CAB3A2DB789F418B59
                                                                                                        APIs
                                                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,00452AC3,?,?,-00000001,00000000), ref: 00452A9D
                                                                                                        • GetLastError.KERNEL32(00000000,?,00000000,00452AC3,?,?,-00000001,00000000), ref: 00452AA5
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorFileFindFirstLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 873889042-0
                                                                                                        • Opcode ID: 9c675a8f1f28b386d0fa8c71b8ecb41695e84785a8bb79b0d9bc0322d07a8b6a
                                                                                                        • Instruction ID: 3e58272229af866f17ac5928e9872a720c3be2d4903e778e839a846eb7d55d53
                                                                                                        • Opcode Fuzzy Hash: 9c675a8f1f28b386d0fa8c71b8ecb41695e84785a8bb79b0d9bc0322d07a8b6a
                                                                                                        • Instruction Fuzzy Hash: 94F0F971A04604AB8B10EF669D4149EF7ACEB8672571046BBFC14E3282DAB84E0485A8
                                                                                                        APIs
                                                                                                        • GetVersion.KERNEL32(?,0046E17A), ref: 0046E0EE
                                                                                                        • CoCreateInstance.OLE32(00499B98,00000000,00000001,00499BA8,?,?,0046E17A), ref: 0046E10A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateInstanceVersion
                                                                                                        • String ID:
                                                                                                        • API String ID: 1462612201-0
                                                                                                        • Opcode ID: 323ef6e325584454da74969db5385277b15969f7569c16a340aaa36caeb4eadb
                                                                                                        • Instruction ID: e32462cabb755f907f5de1887460af807d545ab7c9798ff14e002636b2035e3f
                                                                                                        • Opcode Fuzzy Hash: 323ef6e325584454da74969db5385277b15969f7569c16a340aaa36caeb4eadb
                                                                                                        • Instruction Fuzzy Hash: 90F0A7352812009FEB10975ADC86B8937C47B22315F50007BE04497292D2BD94C0471F
                                                                                                        APIs
                                                                                                        • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,00408633,?,00000000,00408712), ref: 00408586
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InfoLocale
                                                                                                        • String ID:
                                                                                                        • API String ID: 2299586839-0
                                                                                                        • Opcode ID: 64da881718ef9bfb5c3691e8182369eeaf442f2681d4624e7b5adc518b999176
                                                                                                        • Instruction ID: 8daab3ef8e56b0da8b8c23f45c5b5388ad46b50bd825570c2d348c61856efc62
                                                                                                        • Opcode Fuzzy Hash: 64da881718ef9bfb5c3691e8182369eeaf442f2681d4624e7b5adc518b999176
                                                                                                        • Instruction Fuzzy Hash: BFE0223170021466C311AA2A9C86AEAB34C9758310F00427FB904E73C2EDB89E4042A8
                                                                                                        APIs
                                                                                                        • NtdllDefWindowProc_A.USER32(?,?,?,?,?,00424151,?,00000000,0042415C), ref: 00423BAE
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: NtdllProc_Window
                                                                                                        • String ID:
                                                                                                        • API String ID: 4255912815-0
                                                                                                        • Opcode ID: 03c86555d74cd6010afd77b9e61a524e96c156e733cd5bd8e2feacc4387cef90
                                                                                                        • Instruction ID: a748582893d7571d6ac8bdbe819d0a8fbf5f36db2d3505b6f19a51c7a0bbae16
                                                                                                        • Opcode Fuzzy Hash: 03c86555d74cd6010afd77b9e61a524e96c156e733cd5bd8e2feacc4387cef90
                                                                                                        • Instruction Fuzzy Hash: 47F0B979205608AF8B40DF99C588D4ABBE8AB4C260B058195B988CB321C234ED808F90
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: NameUser
                                                                                                        • String ID:
                                                                                                        • API String ID: 2645101109-0
                                                                                                        • Opcode ID: 969018677e36c7ee3cac7a31a88a81c68082f6a067fe28717e4d5eb0c099a74a
                                                                                                        • Instruction ID: 9f318ec9847dd9a6abcb639c8bc611599857aea0b867fcad4bfaeec6bdb042bf
                                                                                                        • Opcode Fuzzy Hash: 969018677e36c7ee3cac7a31a88a81c68082f6a067fe28717e4d5eb0c099a74a
                                                                                                        • Instruction Fuzzy Hash: 8FD0C27230470473CB00AA689C825AA35CD8B84305F00483E3CC5DA2C3FABDDA485756
                                                                                                        APIs
                                                                                                        • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042F53C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: NtdllProc_Window
                                                                                                        • String ID:
                                                                                                        • API String ID: 4255912815-0
                                                                                                        • Opcode ID: 9e43cbcd657a147b44e82c26281af1c584f356d37a2e763e4ec43db1fd6d4cd6
                                                                                                        • Instruction ID: 7ca9c19e24a5def9c493c34941f9da96f9ca037215ec7a65a90973bf7a04e639
                                                                                                        • Opcode Fuzzy Hash: 9e43cbcd657a147b44e82c26281af1c584f356d37a2e763e4ec43db1fd6d4cd6
                                                                                                        • Instruction Fuzzy Hash: FCD09E7120011D7B9B00DE99E840D6B33AD9B88710B909925F945D7642D634ED9197A5

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 844 46f058-46f08a 845 46f0a7 844->845 846 46f08c-46f093 844->846 849 46f0ae-46f0e6 call 403634 call 403738 call 42dec0 845->849 847 46f095-46f09c 846->847 848 46f09e-46f0a5 846->848 847->845 847->848 848->849 856 46f101-46f12a call 403738 call 42dde4 849->856 857 46f0e8-46f0fc call 403738 call 42dec0 849->857 865 46f12c-46f135 call 46ed28 856->865 866 46f13a-46f163 call 46ee44 856->866 857->856 865->866 870 46f175-46f178 call 403400 866->870 871 46f165-46f173 call 403494 866->871 875 46f17d-46f1c8 call 46ee44 call 42c3fc call 46ee8c call 46ee44 870->875 871->875 884 46f1de-46f1ff call 45559c call 46ee44 875->884 885 46f1ca-46f1dd call 46eeb4 875->885 892 46f255-46f25c 884->892 893 46f201-46f254 call 46ee44 call 431404 call 46ee44 call 431404 call 46ee44 884->893 885->884 894 46f25e-46f29b call 431404 call 46ee44 call 431404 call 46ee44 892->894 895 46f29c-46f2a3 892->895 893->892 894->895 899 46f2e4-46f309 call 40b24c call 46ee44 895->899 900 46f2a5-46f2e3 call 46ee44 * 3 895->900 919 46f30b-46f316 call 47c26c 899->919 920 46f318-46f321 call 403494 899->920 900->899 929 46f326-46f331 call 478e04 919->929 920->929 934 46f333-46f338 929->934 935 46f33a 929->935 936 46f33f-46f509 call 403778 call 46ee44 call 47c26c call 46ee8c call 403494 call 40357c * 2 call 46ee44 call 403494 call 40357c * 2 call 46ee44 call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c 934->936 935->936 999 46f51f-46f52d call 46eeb4 936->999 1000 46f50b-46f51d call 46ee44 936->1000 1004 46f532 999->1004 1005 46f533-46f57c call 46eeb4 call 46eee8 call 46ee44 call 47c26c call 46ef4c 1000->1005 1004->1005 1016 46f5a2-46f5af 1005->1016 1017 46f57e-46f5a1 call 46eeb4 * 2 1005->1017 1019 46f5b5-46f5bc 1016->1019 1020 46f67e-46f685 1016->1020 1017->1016 1024 46f5be-46f5c5 1019->1024 1025 46f629-46f638 1019->1025 1021 46f687-46f6bd call 494cec 1020->1021 1022 46f6df-46f6f5 RegCloseKey 1020->1022 1021->1022 1024->1025 1029 46f5c7-46f5eb call 430bcc 1024->1029 1028 46f63b-46f648 1025->1028 1032 46f65f-46f678 call 430c08 call 46eeb4 1028->1032 1033 46f64a-46f657 1028->1033 1029->1028 1039 46f5ed-46f5ee 1029->1039 1042 46f67d 1032->1042 1033->1032 1035 46f659-46f65d 1033->1035 1035->1020 1035->1032 1041 46f5f0-46f616 call 40b24c call 479630 1039->1041 1047 46f623-46f625 1041->1047 1048 46f618-46f61e call 430bcc 1041->1048 1042->1020 1047->1041 1050 46f627 1047->1050 1048->1047 1050->1028
                                                                                                        APIs
                                                                                                          • Part of subcall function 0046EE44: RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,0047620E,?,0049C1E0,?,0046F15B,?,00000000,0046F6F6,?,_is1), ref: 0046EE67
                                                                                                          • Part of subcall function 0046EEB4: RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F532,?,?,00000000,0046F6F6,?,_is1,?), ref: 0046EEC7
                                                                                                        • RegCloseKey.ADVAPI32(?,0046F6FD,?,_is1,?,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,0046F748,?,?,0049C1E0,00000000), ref: 0046F6F0
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Value$Close
                                                                                                        • String ID: " /SILENT$5.5.3 (a)$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$EstimatedSize$HelpLink$HelpTelephone$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: Language$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallDate$InstallLocation$MajorVersion$MinorVersion$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$_is1
                                                                                                        • API String ID: 3391052094-3342197833
                                                                                                        • Opcode ID: 41e5a022c9dfc144d242315d0234d20c9f1df57cded100a3ade253d049a3cf6c
                                                                                                        • Instruction ID: 0d1426ff9ce9a688a4d167ea33859b9e50b28094dc6fe7db73e07d6bdcf854ec
                                                                                                        • Opcode Fuzzy Hash: 41e5a022c9dfc144d242315d0234d20c9f1df57cded100a3ade253d049a3cf6c
                                                                                                        • Instruction Fuzzy Hash: D1125935A001089BDB04EF95E881ADE73F5EB48304F24817BE8506B366EB79AD45CF5E

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1051 492848-49287c call 403684 1054 49287e-49288d call 446f9c Sleep 1051->1054 1055 492892-49289f call 403684 1051->1055 1060 492d22-492d3c call 403420 1054->1060 1061 4928ce-4928db call 403684 1055->1061 1062 4928a1-4928c4 call 446ff8 call 403738 FindWindowA call 447278 1055->1062 1070 49290a-492917 call 403684 1061->1070 1071 4928dd-492905 call 446ff8 call 403738 FindWindowA call 447278 1061->1071 1080 4928c9 1062->1080 1078 492919-49295b call 446f9c * 4 SendMessageA call 447278 1070->1078 1079 492960-49296d call 403684 1070->1079 1071->1060 1078->1060 1090 4929bc-4929c9 call 403684 1079->1090 1091 49296f-4929b7 call 446f9c * 4 PostMessageA call 4470d0 1079->1091 1080->1060 1100 492a18-492a25 call 403684 1090->1100 1101 4929cb-492a13 call 446f9c * 4 SendNotifyMessageA call 4470d0 1090->1101 1091->1060 1113 492a52-492a5f call 403684 1100->1113 1114 492a27-492a4d call 446ff8 call 403738 RegisterClipboardFormatA call 447278 1100->1114 1101->1060 1125 492a61-492a9b call 446f9c * 3 SendMessageA call 447278 1113->1125 1126 492aa0-492aad call 403684 1113->1126 1114->1060 1125->1060 1138 492aaf-492aef call 446f9c * 3 PostMessageA call 4470d0 1126->1138 1139 492af4-492b01 call 403684 1126->1139 1138->1060 1152 492b48-492b55 call 403684 1139->1152 1153 492b03-492b43 call 446f9c * 3 SendNotifyMessageA call 4470d0 1139->1153 1164 492baa-492bb7 call 403684 1152->1164 1165 492b57-492b75 call 446ff8 call 42e394 1152->1165 1153->1060 1175 492bb9-492be5 call 446ff8 call 403738 call 446f9c GetProcAddress 1164->1175 1176 492c31-492c3e call 403684 1164->1176 1185 492b87-492b95 GetLastError call 447278 1165->1185 1186 492b77-492b85 call 447278 1165->1186 1206 492c21-492c2c call 4470d0 1175->1206 1207 492be7-492c1c call 446f9c * 2 call 447278 call 4470d0 1175->1207 1187 492c40-492c61 call 446f9c FreeLibrary call 4470d0 1176->1187 1188 492c66-492c73 call 403684 1176->1188 1194 492b9a-492ba5 call 447278 1185->1194 1186->1194 1187->1060 1203 492c98-492ca5 call 403684 1188->1203 1204 492c75-492c93 call 446ff8 call 403738 CreateMutexA 1188->1204 1194->1060 1215 492cdb-492ce8 call 403684 1203->1215 1216 492ca7-492cd9 call 48ccc8 call 403574 call 403738 OemToCharBuffA call 48cce0 1203->1216 1204->1060 1206->1060 1207->1060 1228 492cea-492d1c call 48ccc8 call 403574 call 403738 CharToOemBuffA call 48cce0 1215->1228 1229 492d1e 1215->1229 1216->1060 1228->1060 1229->1060
                                                                                                        APIs
                                                                                                        • Sleep.KERNEL32(00000000,00000000,00492D3D,?,?,?,?,00000000,00000000,00000000), ref: 00492888
                                                                                                        • FindWindowA.USER32(00000000,00000000), ref: 004928B9
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FindSleepWindow
                                                                                                        • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                                                                                                        • API String ID: 3078808852-3310373309
                                                                                                        • Opcode ID: 543bbb3fa16e1ad260fa6bca8d7f7bf65573201bf2c1e3a3e9abb38e798cd817
                                                                                                        • Instruction ID: 092cd3663c6e49ee7eb77a287a3c2ed341282e51176ce6ebc4a466309821376d
                                                                                                        • Opcode Fuzzy Hash: 543bbb3fa16e1ad260fa6bca8d7f7bf65573201bf2c1e3a3e9abb38e798cd817
                                                                                                        • Instruction Fuzzy Hash: D9C182A0B042003BDB14BF3E9D4551F59A99F95708B119A3FB446EB78BCE7CEC0A4359

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1621 483a7c-483aa1 GetModuleHandleA GetProcAddress 1622 483b08-483b0d GetSystemInfo 1621->1622 1623 483aa3-483ab9 GetNativeSystemInfo GetProcAddress 1621->1623 1624 483b12-483b1b 1622->1624 1623->1624 1625 483abb-483ac6 GetCurrentProcess 1623->1625 1626 483b2b-483b32 1624->1626 1627 483b1d-483b21 1624->1627 1625->1624 1632 483ac8-483acc 1625->1632 1630 483b4d-483b52 1626->1630 1628 483b23-483b27 1627->1628 1629 483b34-483b3b 1627->1629 1633 483b29-483b46 1628->1633 1634 483b3d-483b44 1628->1634 1629->1630 1632->1624 1635 483ace-483ad5 call 45271c 1632->1635 1633->1630 1634->1630 1635->1624 1639 483ad7-483ae4 GetProcAddress 1635->1639 1639->1624 1640 483ae6-483afd GetModuleHandleA GetProcAddress 1639->1640 1640->1624 1641 483aff-483b06 1640->1641 1641->1624
                                                                                                        APIs
                                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00483A8D
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00483A9A
                                                                                                        • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483AA8
                                                                                                        • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483AB0
                                                                                                        • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00483ABC
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00483ADD
                                                                                                        • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483AF0
                                                                                                        • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483AF6
                                                                                                        • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483B0D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
                                                                                                        • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                                                                                                        • API String ID: 2230631259-2623177817
                                                                                                        • Opcode ID: 7dca9948a1095c4364ab55fa8ed369d502b26d1142efbcbd424e95be4cda74f5
                                                                                                        • Instruction ID: d1db678d6bd555fecb25ccca0b477ef677e73c145b16f55f8d8b06b946339d0c
                                                                                                        • Opcode Fuzzy Hash: 7dca9948a1095c4364ab55fa8ed369d502b26d1142efbcbd424e95be4cda74f5
                                                                                                        • Instruction Fuzzy Hash: 7F1181C0204741A4DA00BFB94D45B6F65889B11F2AF040C7B6840AA287EABCEF44A76E

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1647 468d88-468dc0 call 47c26c 1650 468dc6-468dd6 call 478e24 1647->1650 1651 468fa2-468fbc call 403420 1647->1651 1656 468ddb-468e20 call 4078f4 call 403738 call 42de1c 1650->1656 1662 468e25-468e27 1656->1662 1663 468e2d-468e42 1662->1663 1664 468f98-468f9c 1662->1664 1665 468e57-468e5e 1663->1665 1666 468e44-468e52 call 42dd4c 1663->1666 1664->1651 1664->1656 1668 468e60-468e82 call 42dd4c call 42dd64 1665->1668 1669 468e8b-468e92 1665->1669 1666->1665 1668->1669 1686 468e84 1668->1686 1670 468e94-468eb9 call 42dd4c * 2 1669->1670 1671 468eeb-468ef2 1669->1671 1693 468ebb-468ec4 call 4314f8 1670->1693 1694 468ec9-468edb call 42dd4c 1670->1694 1673 468ef4-468f06 call 42dd4c 1671->1673 1674 468f38-468f3f 1671->1674 1687 468f16-468f28 call 42dd4c 1673->1687 1688 468f08-468f11 call 4314f8 1673->1688 1680 468f41-468f75 call 42dd4c * 3 1674->1680 1681 468f7a-468f90 RegCloseKey 1674->1681 1680->1681 1686->1669 1687->1674 1701 468f2a-468f33 call 4314f8 1687->1701 1688->1687 1693->1694 1694->1671 1704 468edd-468ee6 call 4314f8 1694->1704 1701->1674 1704->1671
                                                                                                        APIs
                                                                                                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                                        • RegCloseKey.ADVAPI32(?,00468FA2,?,?,00000001,00000000,00000000,00468FBD,?,00000000,00000000,?), ref: 00468F8B
                                                                                                        Strings
                                                                                                        • %s\%s_is1, xrefs: 00468E05
                                                                                                        • Inno Setup: User Info: Organization, xrefs: 00468F5A
                                                                                                        • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00468DE7
                                                                                                        • Inno Setup: User Info: Name, xrefs: 00468F47
                                                                                                        • Inno Setup: User Info: Serial, xrefs: 00468F6D
                                                                                                        • Inno Setup: Selected Tasks, xrefs: 00468EF7
                                                                                                        • Inno Setup: No Icons, xrefs: 00468E73
                                                                                                        • Inno Setup: App Path, xrefs: 00468E4A
                                                                                                        • Inno Setup: Deselected Components, xrefs: 00468ECC
                                                                                                        • Inno Setup: Icon Group, xrefs: 00468E66
                                                                                                        • Inno Setup: Selected Components, xrefs: 00468EAA
                                                                                                        • Inno Setup: Setup Type, xrefs: 00468E9A
                                                                                                        • Inno Setup: Deselected Tasks, xrefs: 00468F19
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseOpen
                                                                                                        • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                                                        • API String ID: 47109696-1093091907
                                                                                                        • Opcode ID: b9928a5b5c0cf6c1dc91f6627cbb06318d05b30c5d76f15ccadbaf9fdfcb7506
                                                                                                        • Instruction ID: 069c4cdb4b1287edb5c1b702bebeb6c44c7684ad2aa17a57d1fdfe9a2539746b
                                                                                                        • Opcode Fuzzy Hash: b9928a5b5c0cf6c1dc91f6627cbb06318d05b30c5d76f15ccadbaf9fdfcb7506
                                                                                                        • Instruction Fuzzy Hash: 6B51A330A006449BCB15DB65D881BDEB7F5EB48304F50857EE840AB391EB79AF01CB59

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                          • Part of subcall function 0042D898: GetWindowsDirectoryA.KERNEL32(?,00000104,00000000,00453DB4,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5), ref: 0042D8AB
                                                                                                          • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                                                                          • Part of subcall function 0042D8F0: GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453B5A,00000000,00453BFD,?,?,00000000,00000000,00000000,00000000,00000000,?,00453FED,00000000), ref: 0042D90A
                                                                                                          • Part of subcall function 0042D8F0: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D910
                                                                                                        • SHGetKnownFolderPath.SHELL32(00499D30,00008000,00000000,?,00000000,0047C942), ref: 0047C846
                                                                                                        • CoTaskMemFree.OLE32(?,0047C88B), ref: 0047C87E
                                                                                                          • Part of subcall function 0042D208: GetEnvironmentVariableA.KERNEL32(00000000,00000000,00000000,?,?,00000000,0042DA3E,00000000,0042DAD0,?,?,?,0049B628,00000000,00000000), ref: 0042D233
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Directory$AddressEnvironmentFolderFreeHandleKnownModulePathProcSystemTaskVariableWindows
                                                                                                        • String ID: COMMAND.COM$Common Files$CommonFilesDir$Failed to get path of 64-bit Common Files directory$Failed to get path of 64-bit Program Files directory$ProgramFilesDir$SystemDrive$\Program Files$cmd.exe
                                                                                                        • API String ID: 3771764029-544719455
                                                                                                        • Opcode ID: 23963da8b4b34a95ffd58041a931adf40c150fbdd8371ea61f0364dbdea36cdf
                                                                                                        • Instruction ID: 88e29a10730232d74bbdb0c5b7d00c3ea12cf2700f44d19641833b453bfd909d
                                                                                                        • Opcode Fuzzy Hash: 23963da8b4b34a95ffd58041a931adf40c150fbdd8371ea61f0364dbdea36cdf
                                                                                                        • Instruction Fuzzy Hash: 1461CF74A00204AFDB10EBA5D8C2A9E7B69EB44319F90C47FE404A7392DB3C9A44CF5D

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1949 423874-42387e 1950 4239a7-4239ab 1949->1950 1951 423884-4238a6 call 41f3c4 GetClassInfoA 1949->1951 1954 4238d7-4238e0 GetSystemMetrics 1951->1954 1955 4238a8-4238bf RegisterClassA 1951->1955 1957 4238e2 1954->1957 1958 4238e5-4238ef GetSystemMetrics 1954->1958 1955->1954 1956 4238c1-4238d2 call 408cbc call 40311c 1955->1956 1956->1954 1957->1958 1960 4238f1 1958->1960 1961 4238f4-423950 call 403738 call 4062e8 call 403400 call 42364c SetWindowLongA 1958->1961 1960->1961 1972 423952-423965 call 424178 SendMessageA 1961->1972 1973 42396a-423998 GetSystemMenu DeleteMenu * 2 1961->1973 1972->1973 1973->1950 1975 42399a-4239a2 DeleteMenu 1973->1975 1975->1950
                                                                                                        APIs
                                                                                                          • Part of subcall function 0041F3C4: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDA4,?,0042388F,00423C0C,0041EDA4), ref: 0041F3E2
                                                                                                        • GetClassInfoA.USER32(00400000,0042367C), ref: 0042389F
                                                                                                        • RegisterClassA.USER32(00499630), ref: 004238B7
                                                                                                        • GetSystemMetrics.USER32(00000000), ref: 004238D9
                                                                                                        • GetSystemMetrics.USER32(00000001), ref: 004238E8
                                                                                                        • SetWindowLongA.USER32(00410460,000000FC,0042368C), ref: 00423944
                                                                                                        • SendMessageA.USER32(00410460,00000080,00000001,00000000), ref: 00423965
                                                                                                        • GetSystemMenu.USER32(00410460,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C,0041EDA4), ref: 00423970
                                                                                                        • DeleteMenu.USER32(00000000,0000F030,00000000,00410460,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C,0041EDA4), ref: 0042397F
                                                                                                        • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,00410460,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 0042398C
                                                                                                        • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,00410460,00000000,00000000,00400000,00000000,00000000,00000000), ref: 004239A2
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                                                                                                        • String ID: |6B
                                                                                                        • API String ID: 183575631-3009739247
                                                                                                        • Opcode ID: 0318a091630d13b60d0a3e6aa49d41dd0f32c1053a4a49f7651c07b17dd5309d
                                                                                                        • Instruction ID: 5979ac727d64f3fe5c9a0a43452729076f54e0f9e4c251b9a4c28f9d6bed272f
                                                                                                        • Opcode Fuzzy Hash: 0318a091630d13b60d0a3e6aa49d41dd0f32c1053a4a49f7651c07b17dd5309d
                                                                                                        • Instruction Fuzzy Hash: E63152B17402006AEB10AF69DC82F6A37989B14709F60017BFA44EF2D7C6BDED40876D

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1977 47ce78-47cece call 42c3fc call 4035c0 call 47cb3c call 4525d8 1986 47ced0-47ced5 call 453344 1977->1986 1987 47ceda-47cee9 call 4525d8 1977->1987 1986->1987 1991 47cf03-47cf09 1987->1991 1992 47ceeb-47cef1 1987->1992 1995 47cf20-47cf48 call 42e394 * 2 1991->1995 1996 47cf0b-47cf11 1991->1996 1993 47cf13-47cf1b call 403494 1992->1993 1994 47cef3-47cef9 1992->1994 1993->1995 1994->1991 1997 47cefb-47cf01 1994->1997 2003 47cf6f-47cf89 GetProcAddress 1995->2003 2004 47cf4a-47cf6a call 4078f4 call 453344 1995->2004 1996->1993 1996->1995 1997->1991 1997->1993 2006 47cf95-47cfb2 call 403400 * 2 2003->2006 2007 47cf8b-47cf90 call 453344 2003->2007 2004->2003 2007->2006
                                                                                                        APIs
                                                                                                        • GetProcAddress.KERNEL32(74600000,SHGetFolderPathA), ref: 0047CF7A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc
                                                                                                        • String ID: Failed to get address of SHGetFolderPath function$Failed to get version numbers of _shfoldr.dll$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$]xI$_isetup\_shfoldr.dll$shell32.dll$shfolder.dll
                                                                                                        • API String ID: 190572456-256906917
                                                                                                        • Opcode ID: c4b8d3d93c7f37bb14fa31bc5bbe574b3393d33fbabbe9beac26f258e91ad005
                                                                                                        • Instruction ID: ec9c61b31d03a4d18d2fa5da2167344019e511a33ceb5cf80618cf604467b355
                                                                                                        • Opcode Fuzzy Hash: c4b8d3d93c7f37bb14fa31bc5bbe574b3393d33fbabbe9beac26f258e91ad005
                                                                                                        • Instruction Fuzzy Hash: 20311D30E001499BCB10EFA5D5D1ADEB7B5EF44308F50847BE504E7281D778AE458B6D

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 2126 40631c-406336 GetModuleHandleA GetProcAddress 2127 406338 2126->2127 2128 40633f-40634c GetProcAddress 2126->2128 2127->2128 2129 406355-406362 GetProcAddress 2128->2129 2130 40634e 2128->2130 2131 406364-406366 SetProcessDEPPolicy 2129->2131 2132 406368-406369 2129->2132 2130->2129 2131->2132
                                                                                                        APIs
                                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,?,00498BC0), ref: 00406322
                                                                                                        • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040632F
                                                                                                        • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00406345
                                                                                                        • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 0040635B
                                                                                                        • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498BC0), ref: 00406366
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc$HandleModulePolicyProcess
                                                                                                        • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                                                                        • API String ID: 3256987805-3653653586
                                                                                                        • Opcode ID: fb4db72500fb8039bf9e982fa136c472a352d03826636d66c2b82dec8efce00d
                                                                                                        • Instruction ID: 935c6a5f7b98c90e27654dc67135d8c1f882d2ad5d8c1b9d0efaf55941893a49
                                                                                                        • Opcode Fuzzy Hash: fb4db72500fb8039bf9e982fa136c472a352d03826636d66c2b82dec8efce00d
                                                                                                        • Instruction Fuzzy Hash: 97E02D90380702ACEA1032B20D82F3B144C9B54B69B26543B7D56B51C7D9BDDD7059BD
                                                                                                        APIs
                                                                                                        • SetWindowLongA.USER32(?,000000FC,?), ref: 00413664
                                                                                                        • GetWindowLongA.USER32(?,000000F0), ref: 0041366F
                                                                                                        • GetWindowLongA.USER32(?,000000F4), ref: 00413681
                                                                                                        • SetWindowLongA.USER32(?,000000F4,?), ref: 00413694
                                                                                                        • SetPropA.USER32(?,00000000,00000000), ref: 004136AB
                                                                                                        • SetPropA.USER32(?,00000000,00000000), ref: 004136C2
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: LongWindow$Prop
                                                                                                        • String ID: 3A$yA
                                                                                                        • API String ID: 3887896539-3278460822
                                                                                                        • Opcode ID: d9856cee796f57cc1685d9958f98130356579251106e4d85d69cc018d86e5275
                                                                                                        • Instruction ID: bcb4e109f9bb3244d1d15a250a8b19338fc20a7c4ef9bfc7c396c8b3ff51cb63
                                                                                                        • Opcode Fuzzy Hash: d9856cee796f57cc1685d9958f98130356579251106e4d85d69cc018d86e5275
                                                                                                        • Instruction Fuzzy Hash: 8C22D06508E3C05FE31B9B74896A5D57FA0EE13325B1D45DFC4C28B1A3D21E8A8BC71A

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 2894 467180-46722a call 41461c call 41463c call 41461c call 41463c SHGetFileInfo 2903 46725f-46726a call 478e04 2894->2903 2904 46722c-467233 2894->2904 2909 46726c-4672b1 call 42c3fc call 40357c call 403738 ExtractIconA call 4670c0 2903->2909 2910 4672bb-4672ce call 47d33c 2903->2910 2904->2903 2905 467235-46725a ExtractIconA call 4670c0 2904->2905 2905->2903 2932 4672b6 2909->2932 2915 4672d0-4672da call 47d33c 2910->2915 2916 4672df-4672e3 2910->2916 2915->2916 2919 4672e5-467308 call 403738 SHGetFileInfo 2916->2919 2920 46733d-467371 call 403400 * 2 2916->2920 2919->2920 2928 46730a-467311 2919->2928 2928->2920 2931 467313-467338 ExtractIconA call 4670c0 2928->2931 2931->2920 2932->2920
                                                                                                        APIs
                                                                                                        • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 00467223
                                                                                                        • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467249
                                                                                                          • Part of subcall function 004670C0: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 00467158
                                                                                                          • Part of subcall function 004670C0: DestroyCursor.USER32(00000000), ref: 0046716E
                                                                                                        • ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 004672A0
                                                                                                        • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 00467301
                                                                                                        • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467327
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Icon$Extract$FileInfo$CursorDestroyDraw
                                                                                                        • String ID: c:\directory$shell32.dll$%H
                                                                                                        • API String ID: 3376378930-166502273
                                                                                                        • Opcode ID: d7a251f7ede599729126a20c6e5bc656e487c76ea0efebb03c6af550fa195c4c
                                                                                                        • Instruction ID: 732e1a1751fb8a235258c93266195bfa595ebd68417bad8a6af0601d960a2915
                                                                                                        • Opcode Fuzzy Hash: d7a251f7ede599729126a20c6e5bc656e487c76ea0efebb03c6af550fa195c4c
                                                                                                        • Instruction Fuzzy Hash: 8A516070604244AFD710DF65CD8AFDFB7A8EB48308F1081A6F80897351D6789E81DA59
                                                                                                        APIs
                                                                                                        • GetActiveWindow.USER32 ref: 0042F58F
                                                                                                        • GetFocus.USER32 ref: 0042F597
                                                                                                        • RegisterClassA.USER32(004997AC), ref: 0042F5B8
                                                                                                        • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042F68C,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042F5F6
                                                                                                        • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042F63C
                                                                                                        • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042F64D
                                                                                                        • SetFocus.USER32(00000000,00000000,0042F66F,?,?,?,00000001,00000000,?,00458352,00000000,0049B628), ref: 0042F654
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Window$CreateFocus$ActiveClassRegisterShow
                                                                                                        • String ID: TWindowDisabler-Window
                                                                                                        • API String ID: 3167913817-1824977358
                                                                                                        • Opcode ID: d82bdac47665a0423d7aef7e4f95abac113c6b4ba7ee72313a02f6ddbd37ff30
                                                                                                        • Instruction ID: c3989f54cd535b42bfd745bd8d6279a550c1ea008e6f4be51b2d228796931bcd
                                                                                                        • Opcode Fuzzy Hash: d82bdac47665a0423d7aef7e4f95abac113c6b4ba7ee72313a02f6ddbd37ff30
                                                                                                        • Instruction Fuzzy Hash: B021A170740710BAE310EF66AD43F1A76B8EB04B44F91853BF604AB2E1D7B86D0586AD
                                                                                                        APIs
                                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498C06), ref: 00453210
                                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453216
                                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498C06), ref: 0045322A
                                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453230
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressHandleModuleProc
                                                                                                        • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                                                        • API String ID: 1646373207-2130885113
                                                                                                        • Opcode ID: d7661fd9f0913dad122060e2c1ded37189c483bc636f4dff06c0b7ded89dfa78
                                                                                                        • Instruction ID: a781b9bdaab79611976bfea65fa4e072d6e85bd62b4b6e26dfe65079d72397a7
                                                                                                        • Opcode Fuzzy Hash: d7661fd9f0913dad122060e2c1ded37189c483bc636f4dff06c0b7ded89dfa78
                                                                                                        • Instruction Fuzzy Hash: EA01D470240B00FED301AF63AD12F663A58D7557ABF6044BBFC14965C2C77C4A088E6D
                                                                                                        APIs
                                                                                                        • RegisterClipboardFormatA.USER32(commdlg_help), ref: 00430948
                                                                                                        • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 00430957
                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00430971
                                                                                                        • GlobalAddAtomA.KERNEL32(00000000), ref: 00430992
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                                                                                                        • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                                                                                                        • API String ID: 4130936913-2943970505
                                                                                                        • Opcode ID: 8a088dfdc0b2c62b7d21c5c596ec815df7ae76573c78c741c8a86d6eee6cb681
                                                                                                        • Instruction ID: 0bd92e6c8c1c5a5b8444157758b44b4e11dae02c37acc47d2edddbd1fb793b69
                                                                                                        • Opcode Fuzzy Hash: 8a088dfdc0b2c62b7d21c5c596ec815df7ae76573c78c741c8a86d6eee6cb681
                                                                                                        • Instruction Fuzzy Hash: 22F012B0458340DEE300EB65994271E7BD0EF58718F50467FF498A6392D7795904CB5F
                                                                                                        APIs
                                                                                                        • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,0045522C,0045522C,?,0045522C,00000000), ref: 004551BA
                                                                                                        • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,0045522C,0045522C,?,0045522C), ref: 004551C7
                                                                                                          • Part of subcall function 00454F7C: WaitForInputIdle.USER32(?,00000032), ref: 00454FA8
                                                                                                          • Part of subcall function 00454F7C: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00454FCA
                                                                                                          • Part of subcall function 00454F7C: GetExitCodeProcess.KERNEL32(?,?), ref: 00454FD9
                                                                                                          • Part of subcall function 00454F7C: CloseHandle.KERNEL32(?,00455006,00454FFF,?,?,?,00000000,?,?,004551DB,?,?,?,00000044,00000000,00000000), ref: 00454FF9
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
                                                                                                        • String ID: .bat$.cmd$COMMAND.COM" /C $D$cmd.exe" /C "
                                                                                                        • API String ID: 854858120-615399546
                                                                                                        • Opcode ID: 5ea26466aa0b1bd12af3311b8e232ebea4e464fdb3bb6eef9ccee3db0f285c88
                                                                                                        • Instruction ID: 058baa7e90e176347c833b132b7c272bf8058e823d6e061bdbf2f6311869cd9e
                                                                                                        • Opcode Fuzzy Hash: 5ea26466aa0b1bd12af3311b8e232ebea4e464fdb3bb6eef9ccee3db0f285c88
                                                                                                        • Instruction Fuzzy Hash: 41516D34B0074DABCF10EFA5D852BDEBBB9AF44305F50447BB804B7292D7789A098B59
                                                                                                        APIs
                                                                                                        • LoadIconA.USER32(00400000,MAINICON), ref: 0042371C
                                                                                                        • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 00423749
                                                                                                        • OemToCharA.USER32(?,?), ref: 0042375C
                                                                                                        • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 0042379C
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Char$FileIconLoadLowerModuleName
                                                                                                        • String ID: 2$MAINICON
                                                                                                        • API String ID: 3935243913-3181700818
                                                                                                        • Opcode ID: cdc8d4d12959e52a4e35ddab44250c7989461c9b781fe211d3ab07d5faa44346
                                                                                                        • Instruction ID: 339a64ebbf2375270c19ef2cfa2d714624ee8dcb7e06b01b5ae6522dc3b50067
                                                                                                        • Opcode Fuzzy Hash: cdc8d4d12959e52a4e35ddab44250c7989461c9b781fe211d3ab07d5faa44346
                                                                                                        • Instruction Fuzzy Hash: 243181B0A042549ADF10EF29D8C57C67BA8AF14308F4441BAE844DB393D7BED988CB59
                                                                                                        APIs
                                                                                                        • GetCurrentProcessId.KERNEL32(00000000), ref: 00418F3D
                                                                                                        • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F5E
                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00418F79
                                                                                                        • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F9A
                                                                                                          • Part of subcall function 004230C8: GetDC.USER32(00000000), ref: 0042311E
                                                                                                          • Part of subcall function 004230C8: EnumFontsA.GDI32(00000000,00000000,00423068,00410460,00000000,?,?,00000000,?,00418FD3,00000000,?,?,?,00000001), ref: 00423131
                                                                                                          • Part of subcall function 004230C8: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00423139
                                                                                                          • Part of subcall function 004230C8: ReleaseDC.USER32(00000000,00000000), ref: 00423144
                                                                                                          • Part of subcall function 0042368C: LoadIconA.USER32(00400000,MAINICON), ref: 0042371C
                                                                                                          • Part of subcall function 0042368C: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 00423749
                                                                                                          • Part of subcall function 0042368C: OemToCharA.USER32(?,?), ref: 0042375C
                                                                                                          • Part of subcall function 0042368C: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 0042379C
                                                                                                          • Part of subcall function 0041F118: GetVersion.KERNEL32(?,00418FF0,00000000,?,?,?,00000001), ref: 0041F126
                                                                                                          • Part of subcall function 0041F118: SetErrorMode.KERNEL32(00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F142
                                                                                                          • Part of subcall function 0041F118: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F14E
                                                                                                          • Part of subcall function 0041F118: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F15C
                                                                                                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F18C
                                                                                                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1B5
                                                                                                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1CA
                                                                                                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1DF
                                                                                                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F1F4
                                                                                                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F209
                                                                                                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F21E
                                                                                                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F233
                                                                                                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F248
                                                                                                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F25D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc$AtomCharCurrentErrorGlobalLoadMode$CapsDeviceEnumFileFontsIconLibraryLowerModuleNameProcessReleaseThreadVersion
                                                                                                        • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                                                                                                        • API String ID: 316262546-2767913252
                                                                                                        • Opcode ID: b417f06b73a7dba032b12b865c8ed9bc6bb92a8bfb887f153b822e9fb73695be
                                                                                                        • Instruction ID: d883a59e21ed3b4d0722d018b4a025de81f9e45e1fd093e44b5ebaba0e30331f
                                                                                                        • Opcode Fuzzy Hash: b417f06b73a7dba032b12b865c8ed9bc6bb92a8bfb887f153b822e9fb73695be
                                                                                                        • Instruction Fuzzy Hash: AC115E706142419AD740FF76A94235A7BE1DF64308F40943FF448A7391DB3DA9448B5F
                                                                                                        APIs
                                                                                                        • SetWindowLongA.USER32(?,000000FC,?), ref: 00413664
                                                                                                        • GetWindowLongA.USER32(?,000000F0), ref: 0041366F
                                                                                                        • GetWindowLongA.USER32(?,000000F4), ref: 00413681
                                                                                                        • SetWindowLongA.USER32(?,000000F4,?), ref: 00413694
                                                                                                        • SetPropA.USER32(?,00000000,00000000), ref: 004136AB
                                                                                                        • SetPropA.USER32(?,00000000,00000000), ref: 004136C2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: LongWindow$Prop
                                                                                                        • String ID:
                                                                                                        • API String ID: 3887896539-0
                                                                                                        • Opcode ID: 7846fecbe383e6d7fdaea4169180c186d89bab15e88d328ea810806c298c4441
                                                                                                        • Instruction ID: 06abc153636d574f2b9d5b42ed2ef1d3d1989bf2b09c04f5b7aa0ee96fd2bcf7
                                                                                                        • Opcode Fuzzy Hash: 7846fecbe383e6d7fdaea4169180c186d89bab15e88d328ea810806c298c4441
                                                                                                        • Instruction Fuzzy Hash: 1011C975100244BFEF00DF9DDC84EDA37E8EB19364F144666B958DB2A2D738DD908B68
                                                                                                        APIs
                                                                                                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,0045586F,?,00000000,004558AF), ref: 004557B5
                                                                                                        Strings
                                                                                                        • PendingFileRenameOperations2, xrefs: 00455784
                                                                                                        • WININIT.INI, xrefs: 004557E4
                                                                                                        • PendingFileRenameOperations, xrefs: 00455754
                                                                                                        • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455738
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseOpen
                                                                                                        • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                                                                                                        • API String ID: 47109696-2199428270
                                                                                                        • Opcode ID: 430bb035026106b65f85e2b07525b73901b650abba9068f13605831850c1f819
                                                                                                        • Instruction ID: 0fa1da25f67206326559771d92c7e47b52ca8d856d575cc5f046ac455f5bab2a
                                                                                                        • Opcode Fuzzy Hash: 430bb035026106b65f85e2b07525b73901b650abba9068f13605831850c1f819
                                                                                                        • Instruction Fuzzy Hash: FF51A974E006089FDB10EF61DC51AEEB7B9EF44305F50857BEC04A7292DB78AE49CA58
                                                                                                        APIs
                                                                                                        • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,0047CCEA,?,?,00000000,0049B628,00000000,00000000,?,00498539,00000000,004986E2,?,00000000), ref: 0047CC27
                                                                                                        • GetLastError.KERNEL32(00000000,00000000,00000000,0047CCEA,?,?,00000000,0049B628,00000000,00000000,?,00498539,00000000,004986E2,?,00000000), ref: 0047CC30
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateDirectoryErrorLast
                                                                                                        • String ID: Created temporary directory: $\_setup64.tmp$_isetup
                                                                                                        • API String ID: 1375471231-2952887711
                                                                                                        • Opcode ID: 18b8a6295044c03030742dd0e1a53df86680db30ea117cbe65252b99daff8b31
                                                                                                        • Instruction ID: e6577b7b61f0e0a35e690824fc442bae28cfcbc8f9cba78cd8161ab2dbd6b5d1
                                                                                                        • Opcode Fuzzy Hash: 18b8a6295044c03030742dd0e1a53df86680db30ea117cbe65252b99daff8b31
                                                                                                        • Instruction Fuzzy Hash: E6412834A001099BDB11EFA5D882ADEB7B5EF45309F50843BE81577392DA38AE05CF68
                                                                                                        APIs
                                                                                                        • EnumWindows.USER32(00423A1C), ref: 00423AA8
                                                                                                        • GetWindow.USER32(?,00000003), ref: 00423ABD
                                                                                                        • GetWindowLongA.USER32(?,000000EC), ref: 00423ACC
                                                                                                        • SetWindowPos.USER32(00000000,\AB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241AB,?,?,00423D73), ref: 00423B02
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Window$EnumLongWindows
                                                                                                        • String ID: \AB
                                                                                                        • API String ID: 4191631535-3948367934
                                                                                                        • Opcode ID: 1f387ac1e946b45dcea70a74dde1e3cf145931a60cd8f654a7309261af8d74ee
                                                                                                        • Instruction ID: 3ad81c14f5822e14e615a382c86082b2427cd388a5bf15486a3129e996868218
                                                                                                        • Opcode Fuzzy Hash: 1f387ac1e946b45dcea70a74dde1e3cf145931a60cd8f654a7309261af8d74ee
                                                                                                        • Instruction Fuzzy Hash: D6115E70700610ABDB109F28E885F5677E8EB08715F10026AF994AB2E3C378ED41CB59
                                                                                                        APIs
                                                                                                        • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 0042DE50
                                                                                                        • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042DFEB,00000000,0042E003,?,?,?,?,00000006,?,00000000,0049785D), ref: 0042DE6B
                                                                                                        • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DE71
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressDeleteHandleModuleProc
                                                                                                        • String ID: RegDeleteKeyExA$advapi32.dll
                                                                                                        • API String ID: 588496660-1846899949
                                                                                                        • Opcode ID: ed1542cdc99e60fdc1e6205037aed1b156b4601bf62b1d4fa5b097ff81e7402e
                                                                                                        • Instruction ID: e7246de0df94fba710dd2820c0ca51643d5dd29c3ac0bea476bad59fd0e01b91
                                                                                                        • Opcode Fuzzy Hash: ed1542cdc99e60fdc1e6205037aed1b156b4601bf62b1d4fa5b097ff81e7402e
                                                                                                        • Instruction Fuzzy Hash: 73E06DF1B41B30AAD72022657C8ABA33729DB75365F658437F105AD19183FC2C50CE9D
                                                                                                        Strings
                                                                                                        • NextButtonClick, xrefs: 0046BC4C
                                                                                                        • PrepareToInstall failed: %s, xrefs: 0046BE6E
                                                                                                        • Need to restart Windows? %s, xrefs: 0046BE95
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: Need to restart Windows? %s$NextButtonClick$PrepareToInstall failed: %s
                                                                                                        • API String ID: 0-2329492092
                                                                                                        • Opcode ID: bdd1d04c3163942a70fe70ce9c3da0cdba0d450c43b562cfb8d9ec13df8274e7
                                                                                                        • Instruction ID: 9de4db1b3e70fdebeced0fe060001c857bcfdee1b2562a0b259a97201065334e
                                                                                                        • Opcode Fuzzy Hash: bdd1d04c3163942a70fe70ce9c3da0cdba0d450c43b562cfb8d9ec13df8274e7
                                                                                                        • Instruction Fuzzy Hash: 46D12F34A00108DFCB14EB99D985AED77F5EF49304F5440BAE404EB362D778AE85CB9A
                                                                                                        APIs
                                                                                                        • SetActiveWindow.USER32(?,?,00000000,004833D5), ref: 004831A8
                                                                                                        • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 00483246
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ActiveChangeNotifyWindow
                                                                                                        • String ID: $Need to restart Windows? %s
                                                                                                        • API String ID: 1160245247-4200181552
                                                                                                        • Opcode ID: 00647651f2966e2d6c0ac7b0a33bca8c0b176202d01056079f53a530b7b0addf
                                                                                                        • Instruction ID: 855c298393525188f16043e43c8caa20abfdb27870bda8f6eb76b0fac02994d3
                                                                                                        • Opcode Fuzzy Hash: 00647651f2966e2d6c0ac7b0a33bca8c0b176202d01056079f53a530b7b0addf
                                                                                                        • Instruction Fuzzy Hash: 7E918F34A042449FDB10EF69D8C6BAD77E0AF55708F5484BBE8009B362DB78AE05CB5D
                                                                                                        APIs
                                                                                                          • Part of subcall function 0042C804: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C828
                                                                                                        • GetLastError.KERNEL32(00000000,0046FCD9,?,?,0049C1E0,00000000), ref: 0046FBB6
                                                                                                        • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046FC30
                                                                                                        • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046FC55
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ChangeNotify$ErrorFullLastNamePath
                                                                                                        • String ID: Creating directory: %s
                                                                                                        • API String ID: 2451617938-483064649
                                                                                                        • Opcode ID: 1aeec9fc70de36e1ff09abf6a814cf31666cc4aa73152690207cd024c9806782
                                                                                                        • Instruction ID: a145aa70eb484b5d007d33f2831cd5d1f219efd535f83afbcf26a903565c5eea
                                                                                                        • Opcode Fuzzy Hash: 1aeec9fc70de36e1ff09abf6a814cf31666cc4aa73152690207cd024c9806782
                                                                                                        • Instruction Fuzzy Hash: 7D512F74E00248ABDB01DBA5D982ADEBBF4AF49304F50847AEC50B7382D7795E08CB59
                                                                                                        APIs
                                                                                                        • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 00454E82
                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,00454F48), ref: 00454EEC
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressByteCharMultiProcWide
                                                                                                        • String ID: SfcIsFileProtected$sfc.dll
                                                                                                        • API String ID: 2508298434-591603554
                                                                                                        • Opcode ID: bb559eb6b427547f50ac361efa45694dce53a5facbc0d321e4ca2111cb35c873
                                                                                                        • Instruction ID: 709c5f55a6f5f8285c9c61fd8393730e8027effee09c5548c71846991cac34f0
                                                                                                        • Opcode Fuzzy Hash: bb559eb6b427547f50ac361efa45694dce53a5facbc0d321e4ca2111cb35c873
                                                                                                        • Instruction Fuzzy Hash: E8419671A04318DBEB20EF59DC85B9DB7B8AB4430DF5041B7A908A7293D7785F88CA1C
                                                                                                        APIs
                                                                                                        • GetClassInfoA.USER32(00400000,?,?), ref: 0041647F
                                                                                                        • UnregisterClassA.USER32(?,00400000), ref: 004164AB
                                                                                                        • RegisterClassA.USER32(?), ref: 004164CE
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Class$InfoRegisterUnregister
                                                                                                        • String ID: @
                                                                                                        • API String ID: 3749476976-2766056989
                                                                                                        • Opcode ID: df6e090dea74baa5ac925230d828a7230e5c2d53f0976f0f8597eebaced2b944
                                                                                                        • Instruction ID: c77080f262680b7bd3c4c6a37e0a11d074b1995aa9dd52ebf92fb76dd285a693
                                                                                                        • Opcode Fuzzy Hash: df6e090dea74baa5ac925230d828a7230e5c2d53f0976f0f8597eebaced2b944
                                                                                                        • Instruction Fuzzy Hash: B8316D702042409BD720EF69C981B9B77E5AB89308F04457FF949DB392DB39DD44CB6A
                                                                                                        APIs
                                                                                                        • 74D31520.VERSION(00000000,?,?,?,00497900), ref: 00452530
                                                                                                        • 74D31500.VERSION(00000000,?,00000000,?,00000000,004525AB,?,00000000,?,?,?,00497900), ref: 0045255D
                                                                                                        • 74D31540.VERSION(?,004525D4,?,?,00000000,?,00000000,?,00000000,004525AB,?,00000000,?,?,?,00497900), ref: 00452577
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: D31500D31520D31540
                                                                                                        • String ID: %E
                                                                                                        • API String ID: 1003763464-175436132
                                                                                                        • Opcode ID: f18440ec30d6a8502c14f0dca7f1c7caee1af709ad5b943411f89d38bbe9f821
                                                                                                        • Instruction ID: f5dca5bfdad9659449235e2d7a4f424f1fde127461be4d93bb02e754cc996b3f
                                                                                                        • Opcode Fuzzy Hash: f18440ec30d6a8502c14f0dca7f1c7caee1af709ad5b943411f89d38bbe9f821
                                                                                                        • Instruction Fuzzy Hash: D2218331A00608BFDB01DAA989519AFB7FCEB4A300F554477F800E7242E6B9AE04C765
                                                                                                        APIs
                                                                                                        • GetDC.USER32(00000000), ref: 0044B401
                                                                                                        • SelectObject.GDI32(?,00000000), ref: 0044B424
                                                                                                        • ReleaseDC.USER32(00000000,?), ref: 0044B457
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ObjectReleaseSelect
                                                                                                        • String ID: %H
                                                                                                        • API String ID: 1831053106-1959103961
                                                                                                        • Opcode ID: 613a86eb96bd964688756472f8397141eb38d2c4caf6b0936a0a8cf616000036
                                                                                                        • Instruction ID: 242bcfed98594cbdcf51f2854abe94a1ec69c13560e3a72339b9f4254961cc58
                                                                                                        • Opcode Fuzzy Hash: 613a86eb96bd964688756472f8397141eb38d2c4caf6b0936a0a8cf616000036
                                                                                                        • Instruction Fuzzy Hash: 62216570A04248AFEB15DFA6C841B9F7BB9DB49304F11806AF904A7682D778D940CB59
                                                                                                        APIs
                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0044B14C,?,%H,?,?), ref: 0044B11E
                                                                                                        • DrawTextW.USER32(?,?,00000000,?,?), ref: 0044B131
                                                                                                        • DrawTextA.USER32(?,00000000,00000000,?,?), ref: 0044B165
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: DrawText$ByteCharMultiWide
                                                                                                        • String ID: %H
                                                                                                        • API String ID: 65125430-1959103961
                                                                                                        • Opcode ID: b9978a40832644be7eb99ff61e6ae739c3599586bb389d309c0d7579617ef2e1
                                                                                                        • Instruction ID: fec6fabf6d030a51aab30bc406273ff78954f96defe81b00f374268ef7e1f253
                                                                                                        • Opcode Fuzzy Hash: b9978a40832644be7eb99ff61e6ae739c3599586bb389d309c0d7579617ef2e1
                                                                                                        • Instruction Fuzzy Hash: 2A11CBB27046047FEB00DB6A9C91D6F77ECDB49750F10817BF504D72D0D6399E018669
                                                                                                        APIs
                                                                                                        • SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDC5
                                                                                                          • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                                                                          • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                                                                                                          • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                                                                                                        • GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDA8
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressAutoCompleteDirectoryErrorLibraryLoadModeProcSystem
                                                                                                        • String ID: SHAutoComplete$shlwapi.dll
                                                                                                        • API String ID: 395431579-1506664499
                                                                                                        • Opcode ID: 42f9dcb05abbf77f41298dba7160eccf52289638d4fdae2cac913a0c4d077c72
                                                                                                        • Instruction ID: e807f919b0f5f47641bb36d66eaae5ab4e0d2818c3cb02d7dc2bc8906116ae4e
                                                                                                        • Opcode Fuzzy Hash: 42f9dcb05abbf77f41298dba7160eccf52289638d4fdae2cac913a0c4d077c72
                                                                                                        • Instruction Fuzzy Hash: 3311A330B00319BBD711EB62FD85B8E7BA8DB55704F90447BF40066291DBB8AE05C65D
                                                                                                        APIs
                                                                                                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                                        • RegCloseKey.ADVAPI32(?,00455A7B,?,00000001,00000000), ref: 00455A6E
                                                                                                        Strings
                                                                                                        • PendingFileRenameOperations, xrefs: 00455A40
                                                                                                        • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455A1C
                                                                                                        • PendingFileRenameOperations2, xrefs: 00455A4F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseOpen
                                                                                                        • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                                                                                                        • API String ID: 47109696-2115312317
                                                                                                        • Opcode ID: 336a8554af3216e9fad4f98949cc8fac3f30a8fbf7097481dd1a9e766711aba3
                                                                                                        • Instruction ID: e9356c19d9a7d2c1b22529064790e486fb2be540b5bf165494b3782c633fa2c0
                                                                                                        • Opcode Fuzzy Hash: 336a8554af3216e9fad4f98949cc8fac3f30a8fbf7097481dd1a9e766711aba3
                                                                                                        • Instruction Fuzzy Hash: A3F0F671304A08BFDB04D661DC62A3B739CE744725FB08167F800CB682EA7CBD04915C
                                                                                                        APIs
                                                                                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,00472325,?,00000000,?,0049C1E0,00000000,00472515,?,00000000,?,00000000,?,004726E1), ref: 00472301
                                                                                                        • FindClose.KERNEL32(000000FF,0047232C,00472325,?,00000000,?,0049C1E0,00000000,00472515,?,00000000,?,00000000,?,004726E1,?), ref: 0047231F
                                                                                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,00472447,?,00000000,?,0049C1E0,00000000,00472515,?,00000000,?,00000000,?,004726E1), ref: 00472423
                                                                                                        • FindClose.KERNEL32(000000FF,0047244E,00472447,?,00000000,?,0049C1E0,00000000,00472515,?,00000000,?,00000000,?,004726E1,?), ref: 00472441
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Find$CloseFileNext
                                                                                                        • String ID:
                                                                                                        • API String ID: 2066263336-0
                                                                                                        • Opcode ID: 5852171562c0697583dfb39d2e83bd074d15792751f52c1309e6650eed3a72c0
                                                                                                        • Instruction ID: ff38abb04fb96460afd2c3532f2e87b2ffc4f25b99c166b2ff4046d92e8ebf4f
                                                                                                        • Opcode Fuzzy Hash: 5852171562c0697583dfb39d2e83bd074d15792751f52c1309e6650eed3a72c0
                                                                                                        • Instruction Fuzzy Hash: 3EC14C3490424D9FCF11DFA5C981ADEBBB8FF49304F5080AAE808B3251D7789A46CF58
                                                                                                        APIs
                                                                                                        • FindNextFileA.KERNEL32(000000FF,?,?,?,?,00000000,0047FEF1,?,00000000,00000000,?,?,00481147,?,?,00000000), ref: 0047FD9E
                                                                                                        • FindClose.KERNEL32(000000FF,000000FF,?,?,?,?,00000000,0047FEF1,?,00000000,00000000,?,?,00481147,?,?), ref: 0047FDAB
                                                                                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,0047FEC4,?,?,?,?,00000000,0047FEF1,?,00000000,00000000,?,?,00481147), ref: 0047FEA0
                                                                                                        • FindClose.KERNEL32(000000FF,0047FECB,0047FEC4,?,?,?,?,00000000,0047FEF1,?,00000000,00000000,?,?,00481147,?), ref: 0047FEBE
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Find$CloseFileNext
                                                                                                        • String ID:
                                                                                                        • API String ID: 2066263336-0
                                                                                                        • Opcode ID: 56ee50c7cb7fa2545e62f1cc5d9b880787f4aaf8996287a3801f00069153f90f
                                                                                                        • Instruction ID: 5570db9595827249690d4c596f970be035a6cb65fb6c4bc3b070d2a6e7e06d26
                                                                                                        • Opcode Fuzzy Hash: 56ee50c7cb7fa2545e62f1cc5d9b880787f4aaf8996287a3801f00069153f90f
                                                                                                        • Instruction Fuzzy Hash: 34512D71A006499FCB21DF65CC45ADEB7B8EB88319F1084BAA818A7351D7389F89CF54
                                                                                                        APIs
                                                                                                        • GetMenu.USER32(00000000), ref: 00421361
                                                                                                        • SetMenu.USER32(00000000,00000000), ref: 0042137E
                                                                                                        • SetMenu.USER32(00000000,00000000), ref: 004213B3
                                                                                                        • SetMenu.USER32(00000000,00000000), ref: 004213CF
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Menu
                                                                                                        • String ID:
                                                                                                        • API String ID: 3711407533-0
                                                                                                        • Opcode ID: 011238806e8749de4259267c2425fab43e1a23b2a7ed20fe69ece2c0c4e48eae
                                                                                                        • Instruction ID: 68e231870b0c3442489bede8fdcf2aa1db34e154331db007d9f14f65c1163b63
                                                                                                        • Opcode Fuzzy Hash: 011238806e8749de4259267c2425fab43e1a23b2a7ed20fe69ece2c0c4e48eae
                                                                                                        • Instruction Fuzzy Hash: 4641AE3070425447EB20EA3AA9857AB36925B20308F4841BFFC40DF7A3CA7CDD45839D
                                                                                                        APIs
                                                                                                        • SendMessageA.USER32(?,?,?,?), ref: 00416B84
                                                                                                        • SetTextColor.GDI32(?,00000000), ref: 00416B9E
                                                                                                        • SetBkColor.GDI32(?,00000000), ref: 00416BB8
                                                                                                        • CallWindowProcA.USER32(?,?,?,?,?), ref: 00416BE0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Color$CallMessageProcSendTextWindow
                                                                                                        • String ID:
                                                                                                        • API String ID: 601730667-0
                                                                                                        • Opcode ID: 072521f5090f240ceba025e33949739ce14f97652003165ca459573163e57643
                                                                                                        • Instruction ID: 4ea48ea5c9b96bae81565ca4ce64eb356f32bd46963e120bc97d04dec40f2685
                                                                                                        • Opcode Fuzzy Hash: 072521f5090f240ceba025e33949739ce14f97652003165ca459573163e57643
                                                                                                        • Instruction Fuzzy Hash: BC115171705604AFD710EE6ECC84E8777ECEF49310715887EB959CB612C638F8418B69
                                                                                                        APIs
                                                                                                        • GetDC.USER32(00000000), ref: 0042311E
                                                                                                        • EnumFontsA.GDI32(00000000,00000000,00423068,00410460,00000000,?,?,00000000,?,00418FD3,00000000,?,?,?,00000001), ref: 00423131
                                                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00423139
                                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00423144
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CapsDeviceEnumFontsRelease
                                                                                                        • String ID:
                                                                                                        • API String ID: 2698912916-0
                                                                                                        • Opcode ID: ae3b46bdf4144dece9088701a44aa945a4d7eb571b2044da6dc5baa79edeb2ca
                                                                                                        • Instruction ID: a9d24610abdaa6694e735d00c6d38f20457f2ac5f1468c421a1b182fb2ef8db9
                                                                                                        • Opcode Fuzzy Hash: ae3b46bdf4144dece9088701a44aa945a4d7eb571b2044da6dc5baa79edeb2ca
                                                                                                        • Instruction Fuzzy Hash: 8D01CC716042102AE700BF6A5C82B9B3AA49F01319F40027BF808AA3C6DA7E980547AE
                                                                                                        APIs
                                                                                                          • Part of subcall function 0045092C: SetEndOfFile.KERNEL32(?,?,0045C342,00000000,0045C4CD,?,00000000,00000002,00000002), ref: 00450933
                                                                                                        • FlushFileBuffers.KERNEL32(?), ref: 0045C499
                                                                                                        Strings
                                                                                                        • NumRecs range exceeded, xrefs: 0045C396
                                                                                                        • EndOffset range exceeded, xrefs: 0045C3CD
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: File$BuffersFlush
                                                                                                        • String ID: EndOffset range exceeded$NumRecs range exceeded
                                                                                                        • API String ID: 3593489403-659731555
                                                                                                        • Opcode ID: 7579bb90891bfddca92618b6050c99dc039493a8a69e6275f659694612805aa2
                                                                                                        • Instruction ID: 69b4fe9c868b7cadc716880164946defc5db249b4b2908964217ac1dcc813941
                                                                                                        • Opcode Fuzzy Hash: 7579bb90891bfddca92618b6050c99dc039493a8a69e6275f659694612805aa2
                                                                                                        • Instruction Fuzzy Hash: 4F617334A002588FDB25DF25C891AD9B7B5AF49305F0084DAED88AB353D674AEC8CF54
                                                                                                        APIs
                                                                                                          • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,00498BB6), ref: 0040334B
                                                                                                          • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,00498BB6), ref: 00403356
                                                                                                          • Part of subcall function 0040631C: GetModuleHandleA.KERNEL32(kernel32.dll,?,00498BC0), ref: 00406322
                                                                                                          • Part of subcall function 0040631C: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040632F
                                                                                                          • Part of subcall function 0040631C: GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00406345
                                                                                                          • Part of subcall function 0040631C: GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 0040635B
                                                                                                          • Part of subcall function 0040631C: SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498BC0), ref: 00406366
                                                                                                          • Part of subcall function 004063C4: 6F541CD0.COMCTL32(00498BC5), ref: 004063C4
                                                                                                          • Part of subcall function 00410764: GetCurrentThreadId.KERNEL32 ref: 004107B2
                                                                                                          • Part of subcall function 00419040: GetVersion.KERNEL32(00498BDE), ref: 00419040
                                                                                                          • Part of subcall function 0044F744: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,00498BF2), ref: 0044F77F
                                                                                                          • Part of subcall function 0044F744: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F785
                                                                                                          • Part of subcall function 0044FC10: GetVersionExA.KERNEL32(0049B790,00498BF7), ref: 0044FC1F
                                                                                                          • Part of subcall function 004531F0: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498C06), ref: 00453210
                                                                                                          • Part of subcall function 004531F0: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453216
                                                                                                          • Part of subcall function 004531F0: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498C06), ref: 0045322A
                                                                                                          • Part of subcall function 004531F0: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453230
                                                                                                          • Part of subcall function 004570B4: GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 004570D8
                                                                                                          • Part of subcall function 004645F4: LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00498C1A), ref: 00464603
                                                                                                          • Part of subcall function 004645F4: GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464609
                                                                                                          • Part of subcall function 0046CDF0: GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046CE05
                                                                                                          • Part of subcall function 00478C20: GetModuleHandleA.KERNEL32(kernel32.dll,?,00498C24), ref: 00478C26
                                                                                                          • Part of subcall function 00478C20: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478C33
                                                                                                          • Part of subcall function 00478C20: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478C43
                                                                                                          • Part of subcall function 00483F88: GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 00484077
                                                                                                          • Part of subcall function 00495BB4: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 00495BCD
                                                                                                        • SetErrorMode.KERNEL32(00000001,00000000,00498C6C), ref: 00498C3E
                                                                                                          • Part of subcall function 00498968: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498C48,00000001,00000000,00498C6C), ref: 00498972
                                                                                                          • Part of subcall function 00498968: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498978
                                                                                                          • Part of subcall function 004244D4: SendMessageA.USER32(?,0000B020,00000000,?), ref: 004244F3
                                                                                                          • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
                                                                                                        • ShowWindow.USER32(?,00000005,00000000,00498C6C), ref: 00498C9F
                                                                                                          • Part of subcall function 004825C8: SetActiveWindow.USER32(?), ref: 00482676
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc$HandleModule$Window$Version$ActiveClipboardCommandCurrentErrorF541FormatLibraryLineLoadMessageModePolicyProcessRegisterSendShowTextThread
                                                                                                        • String ID: Setup
                                                                                                        • API String ID: 291738113-3839654196
                                                                                                        • Opcode ID: 1594606edc507442c6549f9e4ebdc225aad6ad90dc9fc57b5479ce1c0ac5814d
                                                                                                        • Instruction ID: b535e719d7157e93998cc10f536158ae488692691c8c4e2dacdcbf5c7207fd3e
                                                                                                        • Opcode Fuzzy Hash: 1594606edc507442c6549f9e4ebdc225aad6ad90dc9fc57b5479ce1c0ac5814d
                                                                                                        • Instruction Fuzzy Hash: 873104312446409FD601BBBBFD5392D3B94EF8A728B91447FF80496693DE3C68508A7E
                                                                                                        APIs
                                                                                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,0042DD38), ref: 0042DC3C
                                                                                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,0042DD38), ref: 0042DCAC
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: QueryValue
                                                                                                        • String ID: $=H
                                                                                                        • API String ID: 3660427363-3538597426
                                                                                                        • Opcode ID: b62dc44b296d1c54c0416b8d239270b5fe200a79a82432283709fd1da487490f
                                                                                                        • Instruction ID: 5bd1c55a509b6dee259ffcee94d68868fe84ce326e73fb4cf6662c4527ef549e
                                                                                                        • Opcode Fuzzy Hash: b62dc44b296d1c54c0416b8d239270b5fe200a79a82432283709fd1da487490f
                                                                                                        • Instruction Fuzzy Hash: 9D414171E00529ABDB11DF95D881BAFB7B8EB04704F918466E810F7241D778AE00CBA5
                                                                                                        APIs
                                                                                                        • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00453B13,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A6A
                                                                                                        • GetLastError.KERNEL32(00000000,00000000,?,00000000,00453B13,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A73
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateDirectoryErrorLast
                                                                                                        • String ID: .tmp
                                                                                                        • API String ID: 1375471231-2986845003
                                                                                                        • Opcode ID: 4f6049b6d10a737b279f92eac6e2edda550f3c0c3ab583747f9ca22f4cbd9d09
                                                                                                        • Instruction ID: 2c169793aa1d4e8b0ae54453200dd0eeecd34c8d921a2c5b894f13e1de3ec917
                                                                                                        • Opcode Fuzzy Hash: 4f6049b6d10a737b279f92eac6e2edda550f3c0c3ab583747f9ca22f4cbd9d09
                                                                                                        • Instruction Fuzzy Hash: BD213575A002089BDB01EFA5C8429DEB7B8EF49305F50457BE801B7343DA3CAF058B69
                                                                                                        APIs
                                                                                                          • Part of subcall function 00483A7C: GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00483A8D
                                                                                                          • Part of subcall function 00483A7C: GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00483A9A
                                                                                                          • Part of subcall function 00483A7C: GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483AA8
                                                                                                          • Part of subcall function 00483A7C: GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483AB0
                                                                                                          • Part of subcall function 00483A7C: GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00483ABC
                                                                                                          • Part of subcall function 00483A7C: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00483ADD
                                                                                                          • Part of subcall function 00483A7C: GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483AF0
                                                                                                          • Part of subcall function 00483A7C: GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483AF6
                                                                                                          • Part of subcall function 00483DA8: GetVersionExA.KERNEL32(?,00483FBA,00000000,0048408F,?,?,?,?,?,00498C29), ref: 00483DB6
                                                                                                          • Part of subcall function 00483DA8: GetVersionExA.KERNEL32(0000009C,?,00483FBA,00000000,0048408F,?,?,?,?,?,00498C29), ref: 00483E08
                                                                                                          • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                                                                                                          • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                                                                                                        • GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 00484077
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc$HandleModuleVersion$CurrentErrorInfoLibraryLoadModeNativeProcessSystem
                                                                                                        • String ID: SHGetKnownFolderPath$shell32.dll
                                                                                                        • API String ID: 3869789854-2936008475
                                                                                                        • Opcode ID: 24bfbd8baf235fcbd7404033d7799f009542697b8823181e059981251f96c700
                                                                                                        • Instruction ID: 8066e8dcbdf9c94243579ba2519058cd674f052446347c20ec70bbddfecd8a90
                                                                                                        • Opcode Fuzzy Hash: 24bfbd8baf235fcbd7404033d7799f009542697b8823181e059981251f96c700
                                                                                                        • Instruction Fuzzy Hash: 1021F1B06103116AC700BFBE599611B3BA5EB9570C380893FF904DB391D77E68149B6E
                                                                                                        APIs
                                                                                                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,0047C92C,00000000,0047C942), ref: 0047C63A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Close
                                                                                                        • String ID: RegisteredOrganization$RegisteredOwner
                                                                                                        • API String ID: 3535843008-1113070880
                                                                                                        • Opcode ID: fe32ea5757c181cea0fad4739291adb7fe5cb56e5df920aee23c3361bee12acf
                                                                                                        • Instruction ID: 97ba07fcc0924f8d698b93a4c32f8f7a3ceb81663af41ec066a5e596666b9838
                                                                                                        • Opcode Fuzzy Hash: fe32ea5757c181cea0fad4739291adb7fe5cb56e5df920aee23c3361bee12acf
                                                                                                        • Instruction Fuzzy Hash: F5F09060700204ABEB00D6A8ACD2BAA3769D750304F60907FA1058F382C679EE019B5C
                                                                                                        APIs
                                                                                                        • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,00475483), ref: 00475271
                                                                                                        • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,00475483), ref: 00475288
                                                                                                          • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseCreateErrorFileHandleLast
                                                                                                        • String ID: CreateFile
                                                                                                        • API String ID: 2528220319-823142352
                                                                                                        • Opcode ID: 2c7b4fae504844472e6a07c4f0bcfda842c0d735d71c8af9ff6e211e096a353b
                                                                                                        • Instruction ID: b0794b45f16520e4762b2717541816a935241bfc2e667b83be7f23d95be3de9d
                                                                                                        • Opcode Fuzzy Hash: 2c7b4fae504844472e6a07c4f0bcfda842c0d735d71c8af9ff6e211e096a353b
                                                                                                        • Instruction Fuzzy Hash: 99E06D702403447FEA10FA69CCC6F4A77989B04728F10C152BA48AF3E3C5B9FC808A58
                                                                                                        APIs
                                                                                                        • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Open
                                                                                                        • String ID: System\CurrentControlSet\Control\Windows$;H
                                                                                                        • API String ID: 71445658-2565060666
                                                                                                        • Opcode ID: a11f376e1d034aeb0d9ae53f60934921bcd728bb93d306f1768079d63b1ffdfe
                                                                                                        • Instruction ID: 60e43675bb36a9eef4a15598a1848ca3f705ecc445ee8c9fe52fc6b05f1352bb
                                                                                                        • Opcode Fuzzy Hash: a11f376e1d034aeb0d9ae53f60934921bcd728bb93d306f1768079d63b1ffdfe
                                                                                                        • Instruction Fuzzy Hash: 29D09E72950128BB9B009A89DC41DFB775DDB15760F45441BF9049B141C5B4AC5197E4
                                                                                                        APIs
                                                                                                          • Part of subcall function 00457044: CoInitialize.OLE32(00000000), ref: 0045704A
                                                                                                          • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                                                                                                          • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                                                                                                        • GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 004570D8
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressErrorInitializeLibraryLoadModeProc
                                                                                                        • String ID: SHCreateItemFromParsingName$shell32.dll
                                                                                                        • API String ID: 2906209438-2320870614
                                                                                                        • Opcode ID: 9d30f7af3022304e39d9007edb753d7b8512de14ad0f58a0e87bb64db50414c6
                                                                                                        • Instruction ID: 7fba65882f7194314ab185764ebfac318737a269d5660949bdaf7135ffc1064c
                                                                                                        • Opcode Fuzzy Hash: 9d30f7af3022304e39d9007edb753d7b8512de14ad0f58a0e87bb64db50414c6
                                                                                                        • Instruction Fuzzy Hash: ECC08CA074860093CB40B3FA344320E1841AB8071FB10C07F7A04A66C7DE3C88088B2E
                                                                                                        APIs
                                                                                                          • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                                                                                                          • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                                                                                                        • GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046CE05
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressErrorLibraryLoadModeProc
                                                                                                        • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                                                        • API String ID: 2492108670-2683653824
                                                                                                        • Opcode ID: 4f35c33f472421c4948a2ce6cac4f72f28d005e98571f32e7a9733a845a9f857
                                                                                                        • Instruction ID: c0603f0a452a360a01ce82207306765f02b8a986224f2e77b24b084cc810d505
                                                                                                        • Opcode Fuzzy Hash: 4f35c33f472421c4948a2ce6cac4f72f28d005e98571f32e7a9733a845a9f857
                                                                                                        • Instruction Fuzzy Hash: 44B092A060074086DB40B7A298D262B28269740319B20843BB0CC9BA95EB3E88240B9F
                                                                                                        APIs
                                                                                                        • LoadLibraryExA.KERNEL32(00000000,00000000,00000008,?,?,00000000,00448709), ref: 0044864C
                                                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 004486CD
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressLibraryLoadProc
                                                                                                        • String ID:
                                                                                                        • API String ID: 2574300362-0
                                                                                                        • Opcode ID: 36521cdfc13aba0ae9c44214f12a2e14552a0dd36018004eb1372d311063bccb
                                                                                                        • Instruction ID: 2eaa58f6359003fef9dee836e3db1fa56ae38c906bc4f4c4d93ca6671f7cd4fb
                                                                                                        • Opcode Fuzzy Hash: 36521cdfc13aba0ae9c44214f12a2e14552a0dd36018004eb1372d311063bccb
                                                                                                        • Instruction Fuzzy Hash: 14515470E00105AFDB40EF95C491AAEBBF9EB45319F11817FE414BB391DA389E05CB99
                                                                                                        APIs
                                                                                                        • GetSystemMenu.USER32(00000000,00000000,00000000,00481DB4), ref: 00481D4C
                                                                                                        • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 00481D5D
                                                                                                        • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00481D75
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Menu$Append$System
                                                                                                        • String ID:
                                                                                                        • API String ID: 1489644407-0
                                                                                                        • Opcode ID: 672145a2bbc7660003845448dd8fd579fca208d3c81716cd1fbd69936c4767aa
                                                                                                        • Instruction ID: 44f8b16540ed1c6eecf525242fd074403e334eda66194076213ef08da8c10300
                                                                                                        • Opcode Fuzzy Hash: 672145a2bbc7660003845448dd8fd579fca208d3c81716cd1fbd69936c4767aa
                                                                                                        • Instruction Fuzzy Hash: 3431D4307043441AD721FB769C82BAE3A989F15318F54483FF901AB2E3CA7CAD09879D
                                                                                                        APIs
                                                                                                        • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00424412
                                                                                                        • TranslateMessage.USER32(?), ref: 0042448F
                                                                                                        • DispatchMessageA.USER32(?), ref: 00424499
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Message$DispatchPeekTranslate
                                                                                                        • String ID:
                                                                                                        • API String ID: 4217535847-0
                                                                                                        • Opcode ID: d4f7142ddfb2041a0388c754ad29f8297397d1c5d5a6fc901d04af05902ad934
                                                                                                        • Instruction ID: 8eae6dca0d2455523dd27ca57e4683f6da326f6f2f90499d04ddbfd693f83f9d
                                                                                                        • Opcode Fuzzy Hash: d4f7142ddfb2041a0388c754ad29f8297397d1c5d5a6fc901d04af05902ad934
                                                                                                        • Instruction Fuzzy Hash: E3116D303043205AEB20FA24A941B9F73D4DFC5758F80481EFC99972C2D77D9D49879A
                                                                                                        APIs
                                                                                                        • SetPropA.USER32(00000000,00000000), ref: 0041666A
                                                                                                        • SetPropA.USER32(00000000,00000000), ref: 0041667F
                                                                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 004166A6
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Prop$Window
                                                                                                        • String ID:
                                                                                                        • API String ID: 3363284559-0
                                                                                                        • Opcode ID: 953367bc10487f5f00132df45b9f4bdc07709d3a3f88142737615a1cc8063318
                                                                                                        • Instruction ID: 6913c5f2d07602d921388148e43cadd8ab2d6729f30613f48e4cae6714e3bc13
                                                                                                        • Opcode Fuzzy Hash: 953367bc10487f5f00132df45b9f4bdc07709d3a3f88142737615a1cc8063318
                                                                                                        • Instruction Fuzzy Hash: ACF01271701210ABDB10AB599C85FA732DCAB09714F16057AB905EF286C778DC40C7A8
                                                                                                        APIs
                                                                                                        • IsWindowVisible.USER32(?), ref: 0041EE64
                                                                                                        • IsWindowEnabled.USER32(?), ref: 0041EE6E
                                                                                                        • EnableWindow.USER32(?,00000000), ref: 0041EE94
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Window$EnableEnabledVisible
                                                                                                        • String ID:
                                                                                                        • API String ID: 3234591441-0
                                                                                                        • Opcode ID: 495d6a49dc4b54b7e424eeae3cce025a94256eba33976185de8149e812397146
                                                                                                        • Instruction ID: 3b4cb379701a2ac24b7d0c87bf9454d2e26b3d0fb89a85d5a5a22e513a73856b
                                                                                                        • Opcode Fuzzy Hash: 495d6a49dc4b54b7e424eeae3cce025a94256eba33976185de8149e812397146
                                                                                                        • Instruction Fuzzy Hash: EAE06DB5100301AAE301AB2BDC81B5B7A9CAB54350F05843BA9089B292D63ADC408B7C
                                                                                                        APIs
                                                                                                        • SetActiveWindow.USER32(?), ref: 0046A02D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ActiveWindow
                                                                                                        • String ID: PrepareToInstall
                                                                                                        • API String ID: 2558294473-1101760603
                                                                                                        • Opcode ID: bd917288eaa5b05b1195b505efe9116c2b5c78d32a5283306b423edfa0bdd6d5
                                                                                                        • Instruction ID: c614f106b7f0b4f176116dff63491c2ec041d81708a05a15fd0d1780f22877a3
                                                                                                        • Opcode Fuzzy Hash: bd917288eaa5b05b1195b505efe9116c2b5c78d32a5283306b423edfa0bdd6d5
                                                                                                        • Instruction Fuzzy Hash: 97A14934A00109DFCB00EF99D986EDEB7F5AF48304F5540B6E404AB362D738AE45CB9A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: /:*?"<>|
                                                                                                        • API String ID: 0-4078764451
                                                                                                        • Opcode ID: e5c60157bcf2278da473a52dbfa3e40327efacf8e8b2ac4b78b74c9d89147c88
                                                                                                        • Instruction ID: 6c3526c54916fe71946563460b5bd12015a165326d65a32731909bc5939f884d
                                                                                                        • Opcode Fuzzy Hash: e5c60157bcf2278da473a52dbfa3e40327efacf8e8b2ac4b78b74c9d89147c88
                                                                                                        • Instruction Fuzzy Hash: CF71C370A40215BADB10E766DCD2FEE7BA19F05308F148067F580BB292E779AD458B4E
                                                                                                        APIs
                                                                                                        • SetActiveWindow.USER32(?), ref: 00482676
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ActiveWindow
                                                                                                        • String ID: InitializeWizard
                                                                                                        • API String ID: 2558294473-2356795471
                                                                                                        • Opcode ID: 3626624f3147e861467950174f06d96ecabfee41a1c9b8d7b2440425271d24be
                                                                                                        • Instruction ID: 0fabbc08dbff6a0894d12042e1c617afa12541eacf44f0b659f2bb150b55c2ae
                                                                                                        • Opcode Fuzzy Hash: 3626624f3147e861467950174f06d96ecabfee41a1c9b8d7b2440425271d24be
                                                                                                        • Instruction Fuzzy Hash: 8311C130204200AFD700EB69EED6B1A37E4E764328F60057BE404D72A1EA796C41CB5E
                                                                                                        APIs
                                                                                                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,0047C740,00000000,0047C942), ref: 0047C539
                                                                                                        Strings
                                                                                                        • Software\Microsoft\Windows\CurrentVersion, xrefs: 0047C509
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseOpen
                                                                                                        • String ID: Software\Microsoft\Windows\CurrentVersion
                                                                                                        • API String ID: 47109696-1019749484
                                                                                                        • Opcode ID: 058bbab7ea9ec86a0dd33160b35f36364f977485e0abef3b7f9f2bc760079b92
                                                                                                        • Instruction ID: acdf9366f140fa0c09696ff4b806567a5b27613a006b44f2785fa8682630d216
                                                                                                        • Opcode Fuzzy Hash: 058bbab7ea9ec86a0dd33160b35f36364f977485e0abef3b7f9f2bc760079b92
                                                                                                        • Instruction Fuzzy Hash: 6CF0823170052477DA00A65E6C82B9FA79D8B84758F60403FF508DB242EABAEE0243EC
                                                                                                        APIs
                                                                                                        • RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,0047620E,?,0049C1E0,?,0046F15B,?,00000000,0046F6F6,?,_is1), ref: 0046EE67
                                                                                                        Strings
                                                                                                        • Inno Setup: Setup Version, xrefs: 0046EE65
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Value
                                                                                                        • String ID: Inno Setup: Setup Version
                                                                                                        • API String ID: 3702945584-4166306022
                                                                                                        • Opcode ID: 80676ca53bf8d59feef104d4bc7cb567c816a54b460bafb4a4ed583678a3f251
                                                                                                        • Instruction ID: 37dbbd71146fd60ed96ba35b84ff74d599aeccd68d0f9eb37ee109455dfe34ad
                                                                                                        • Opcode Fuzzy Hash: 80676ca53bf8d59feef104d4bc7cb567c816a54b460bafb4a4ed583678a3f251
                                                                                                        • Instruction Fuzzy Hash: B1E06D753012043FE710AA2B9C85F5BBADCDF88365F10403AB908DB392D578DD0181A9
                                                                                                        APIs
                                                                                                        • RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F532,?,?,00000000,0046F6F6,?,_is1,?), ref: 0046EEC7
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Value
                                                                                                        • String ID: NoModify
                                                                                                        • API String ID: 3702945584-1699962838
                                                                                                        • Opcode ID: f40bfeae81701b53243146576d0ffb0e6a468f93b3df03c8cd4f9f1e738a44cb
                                                                                                        • Instruction ID: 84621f748531697c6bb4a8e0450a59e651a2caf9945441e4ffcb8bd5fa838dfd
                                                                                                        • Opcode Fuzzy Hash: f40bfeae81701b53243146576d0ffb0e6a468f93b3df03c8cd4f9f1e738a44cb
                                                                                                        • Instruction Fuzzy Hash: F6E04FB4640308BFEB04DB55CD4AF6B77ECDB48714F10405ABA049B281E674FE00C669
                                                                                                        APIs
                                                                                                        • GetACP.KERNEL32(?,?,00000001,00000000,0047E753,?,-0000001A,00480609,-00000010,?,00000004,0000001B,00000000,00480956,?,0045DB68), ref: 0047E4EA
                                                                                                          • Part of subcall function 0042E31C: GetDC.USER32(00000000), ref: 0042E32B
                                                                                                          • Part of subcall function 0042E31C: EnumFontsA.GDI32(?,00000000,0042E308,00000000,00000000,0042E374,?,00000000,00000000,004809BD,?,?,00000001,00000000,00000002,00000000), ref: 0042E356
                                                                                                          • Part of subcall function 0042E31C: ReleaseDC.USER32(00000000,?), ref: 0042E36E
                                                                                                        • SendNotifyMessageA.USER32(00020456,00000496,00002711,-00000001), ref: 0047E6BA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: EnumFontsMessageNotifyReleaseSend
                                                                                                        • String ID:
                                                                                                        • API String ID: 2649214853-0
                                                                                                        • Opcode ID: 7f479caed6d506e1fedd37a3e9b8fbc918d7d672324c4412b746d2e8a14c4527
                                                                                                        • Instruction ID: a62c935d52da393e7312112ce75ddb0898731394ffd2a16b1d4fc3e518f8127d
                                                                                                        • Opcode Fuzzy Hash: 7f479caed6d506e1fedd37a3e9b8fbc918d7d672324c4412b746d2e8a14c4527
                                                                                                        • Instruction Fuzzy Hash: 5B5195746001049BC710FF67E98169A37E5EB58308B90C67BA8049B3A6DB3CED45CB9D
                                                                                                        APIs
                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,0047DF83,?,?,?,?,00000000,00000000,00000000,00000000), ref: 0047DF3D
                                                                                                          • Part of subcall function 0042CA00: GetSystemMetrics.USER32(0000002A), ref: 0042CA12
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ByteCharMetricsMultiSystemWide
                                                                                                        • String ID: /G
                                                                                                        • API String ID: 224039744-2088674125
                                                                                                        • Opcode ID: 9f8ad520ff63b3f089cafa147e7d8bbd1691bb3a433f158030b0d1014876a4d7
                                                                                                        • Instruction ID: 84c81a41a939c89cd5cf89585cf0d961f9543ff151f38a86aad590f5673b43e0
                                                                                                        • Opcode Fuzzy Hash: 9f8ad520ff63b3f089cafa147e7d8bbd1691bb3a433f158030b0d1014876a4d7
                                                                                                        • Instruction Fuzzy Hash: 53518070A04215AFDB21DF55D8C4FAA7BB8EF64318F118077E404AB3A1C778AE45CB99
                                                                                                        APIs
                                                                                                        • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,0042DFD6,?,?,00000008,00000000,00000000,0042E003), ref: 0042DF6C
                                                                                                        • RegCloseKey.ADVAPI32(?,0042DFDD,?,00000000,00000000,00000000,00000000,00000000,0042DFD6,?,?,00000008,00000000,00000000,0042E003), ref: 0042DFD0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseEnum
                                                                                                        • String ID:
                                                                                                        • API String ID: 2818636725-0
                                                                                                        • Opcode ID: 54e2847b2ed8cbec0c232d6556bf46b22f1e93997a90c035dd6b8310f6c19c74
                                                                                                        • Instruction ID: d62689c7b7995b9893119ef97773413105dd68debc8ff02f2d4f9d8a28cc91ff
                                                                                                        • Opcode Fuzzy Hash: 54e2847b2ed8cbec0c232d6556bf46b22f1e93997a90c035dd6b8310f6c19c74
                                                                                                        • Instruction Fuzzy Hash: DD31B270F04258AEDB11DFA6DD42BAEBBB9EB49304F91407BE501E6280D6785E01CA2D
                                                                                                        APIs
                                                                                                        • CreateProcessA.KERNEL32(00000000,00000000,?,?,00458278,00000000,00458260,?,?,?,00000000,00452862,?,?,?,00000001), ref: 0045283C
                                                                                                        • GetLastError.KERNEL32(00000000,00000000,?,?,00458278,00000000,00458260,?,?,?,00000000,00452862,?,?,?,00000001), ref: 00452844
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateErrorLastProcess
                                                                                                        • String ID:
                                                                                                        • API String ID: 2919029540-0
                                                                                                        • Opcode ID: 32d7980bd8ec2bee900e92c865b72ef71cfaa45d55aa0c85c0401d49ed696f28
                                                                                                        • Instruction ID: fcc055d8c1a696a2a0db1e32a085008d871673fec5534948229a16d4440eefa6
                                                                                                        • Opcode Fuzzy Hash: 32d7980bd8ec2bee900e92c865b72ef71cfaa45d55aa0c85c0401d49ed696f28
                                                                                                        • Instruction Fuzzy Hash: A2113C72600208AF8B40DEA9DD41D9F77ECEB4E310B114567FD18D3241D678EE148B68
                                                                                                        APIs
                                                                                                        • VirtualAlloc.KERNEL32(?,?,00001000,00000004), ref: 004016E5
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AllocVirtual
                                                                                                        • String ID: )^
                                                                                                        • API String ID: 4275171209-748976004
                                                                                                        • Opcode ID: 47d193b6e2a7cd5d08654666eaa389c617a6dede1e25b429ba4b9347f0204c7a
                                                                                                        • Instruction ID: 6a16e23f067707d24f18c42e6f5d2b80673e03c7ad610ea939709aa0270b7034
                                                                                                        • Opcode Fuzzy Hash: 47d193b6e2a7cd5d08654666eaa389c617a6dede1e25b429ba4b9347f0204c7a
                                                                                                        • Instruction Fuzzy Hash: 7E11C272A057059FC3108F19CC80A2BB7E5EFC4764F09C93DE598673A5D735AC409789
                                                                                                        APIs
                                                                                                        • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040ADF2
                                                                                                        • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040AF4F,00000000,0040AF67,?,?,?,00000000), ref: 0040AE03
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Resource$FindFree
                                                                                                        • String ID:
                                                                                                        • API String ID: 4097029671-0
                                                                                                        • Opcode ID: 07387713778517d694c210176a4718dd0562bb365b6db4bb8115bda04798bcb6
                                                                                                        • Instruction ID: 3d7a77417cef7b3885e8747e4544195f2de945da78ee84bb1155330bb8f828e3
                                                                                                        • Opcode Fuzzy Hash: 07387713778517d694c210176a4718dd0562bb365b6db4bb8115bda04798bcb6
                                                                                                        • Instruction Fuzzy Hash: 0301F771300700AFD700FF69EC52E1B77EDDB46714710807AF500AB3D1D639AC10966A
                                                                                                        APIs
                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 0041EEF3
                                                                                                        • EnumThreadWindows.USER32(00000000,0041EE54,00000000), ref: 0041EEF9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Thread$CurrentEnumWindows
                                                                                                        • String ID:
                                                                                                        • API String ID: 2396873506-0
                                                                                                        • Opcode ID: 30aad164e0a195eeb96462141dc827bf49acbc8680001675c00c89b7ac155170
                                                                                                        • Instruction ID: bcaa23655132f8f2785c0a842f21b48ac99b37e3223c43442b01e3940dbd0cdf
                                                                                                        • Opcode Fuzzy Hash: 30aad164e0a195eeb96462141dc827bf49acbc8680001675c00c89b7ac155170
                                                                                                        • Instruction Fuzzy Hash: 31015B76A04604BFD706CF6BEC1199ABBE8E789720B22887BEC04D3690E7355C10DF18
                                                                                                        APIs
                                                                                                        • MoveFileA.KERNEL32(00000000,00000000), ref: 00452CC2
                                                                                                        • GetLastError.KERNEL32(00000000,00000000,00000000,00452CE8), ref: 00452CCA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorFileLastMove
                                                                                                        • String ID:
                                                                                                        • API String ID: 55378915-0
                                                                                                        • Opcode ID: 92f277caa9c3c56662d1ce6f28aaa0531c95695199337b3952b9b7b9e7465d28
                                                                                                        • Instruction ID: 1f9035ddd188b097fe3d15476f32cd7793c58c8f4df07880d9fc6ba60e4ff235
                                                                                                        • Opcode Fuzzy Hash: 92f277caa9c3c56662d1ce6f28aaa0531c95695199337b3952b9b7b9e7465d28
                                                                                                        • Instruction Fuzzy Hash: 9401D671A04208AB8712EB799D4149EB7ECEB8A32575045BBFC04E3243EA785E048558
                                                                                                        APIs
                                                                                                        • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,004527CF), ref: 004527A9
                                                                                                        • GetLastError.KERNEL32(00000000,00000000,00000000,004527CF), ref: 004527B1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateDirectoryErrorLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 1375471231-0
                                                                                                        • Opcode ID: 855e2e178366579e8cdbc9f044a0346376c594dce53ca60ac40061c8de66a150
                                                                                                        • Instruction ID: e3b373b60118a844676bb749001e6832c3b26a50706decb61b3ae2e0e224b701
                                                                                                        • Opcode Fuzzy Hash: 855e2e178366579e8cdbc9f044a0346376c594dce53ca60ac40061c8de66a150
                                                                                                        • Instruction Fuzzy Hash: 40F02871A00308BBCB01EF759D4259EB7E8EB4E311B2045B7FC04E3642E6B94E04859C
                                                                                                        APIs
                                                                                                        • LoadCursorA.USER32(00000000,00007F00), ref: 00423249
                                                                                                        • LoadCursorA.USER32(00000000,00000000), ref: 00423273
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CursorLoad
                                                                                                        • String ID:
                                                                                                        • API String ID: 3238433803-0
                                                                                                        • Opcode ID: 0c9a104e89a33193f60416200903d3bd70bbd31149720632682593485f60625b
                                                                                                        • Instruction ID: 5e34cf6406f075c2c63d733b1f02ef4b9a88184ee1572dc0f3c8875cc615d59b
                                                                                                        • Opcode Fuzzy Hash: 0c9a104e89a33193f60416200903d3bd70bbd31149720632682593485f60625b
                                                                                                        • Instruction Fuzzy Hash: 9EF0A711B04254AADA109E7E6CC0D6B72A8DF82735B61037BFA3EC72D1C62E1D414569
                                                                                                        APIs
                                                                                                        • SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                                                                                                        • LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLibraryLoadMode
                                                                                                        • String ID:
                                                                                                        • API String ID: 2987862817-0
                                                                                                        • Opcode ID: 4bb5710dc3172506f3a82e57bec548632d1945d06b3d92e94bd16d63dfaa8550
                                                                                                        • Instruction ID: 14c2566281f292fbf4bc3f3871eddb8f7eb4f11f4d1149329263d7d1c8790498
                                                                                                        • Opcode Fuzzy Hash: 4bb5710dc3172506f3a82e57bec548632d1945d06b3d92e94bd16d63dfaa8550
                                                                                                        • Instruction Fuzzy Hash: 02F08970B147447FDB119F779CA241BBBECDB49B1175249B6F800A3591E53C4910C928
                                                                                                        APIs
                                                                                                        • SHGetKnownFolderPath.SHELL32(00499D40,00008000,00000000,?), ref: 0047C89B
                                                                                                        • CoTaskMemFree.OLE32(?,0047C8DE), ref: 0047C8D1
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FolderFreeKnownPathTask
                                                                                                        • String ID: COMMAND.COM$Common Files$CommonFilesDir$Failed to get path of 64-bit Common Files directory$Failed to get path of 64-bit Program Files directory$ProgramFilesDir$SystemDrive$\Program Files$cmd.exe
                                                                                                        • API String ID: 969438705-544719455
                                                                                                        • Opcode ID: c380859d91d2530b1710b7ab5da91f48806622674321ef44444f1ad2bc0d7433
                                                                                                        • Instruction ID: f48ec61de784b6bea0373c7a91bc006da4a0813e938d35ae17fa89473a65de5f
                                                                                                        • Opcode Fuzzy Hash: c380859d91d2530b1710b7ab5da91f48806622674321ef44444f1ad2bc0d7433
                                                                                                        • Instruction Fuzzy Hash: 22E09230340604BFEB15EB61DC92F6977A8EB48B01B72847BF504E2680D67CAD00DB1C
                                                                                                        APIs
                                                                                                        • SetFilePointer.KERNEL32(?,00000000,?,00000002,?,?,00470149,?,00000000), ref: 0045090E
                                                                                                        • GetLastError.KERNEL32(?,00000000,?,00000002,?,?,00470149,?,00000000), ref: 00450916
                                                                                                          • Part of subcall function 004506B4: GetLastError.KERNEL32(004504D0,00450776,?,00000000,?,00497E2C,00000001,00000000,00000002,00000000,00497F8D,?,?,00000005,00000000,00497FC1), ref: 004506B7
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$FilePointer
                                                                                                        • String ID:
                                                                                                        • API String ID: 1156039329-0
                                                                                                        • Opcode ID: ec46a7bc9e5a7a34518fa7989fb6988307d7ef9dfce9dbcd61575ad1106d4b51
                                                                                                        • Instruction ID: 32d43412562f4d6ab64aa8be608e77008e370c57458e4df53f7444e76f76d0cb
                                                                                                        • Opcode Fuzzy Hash: ec46a7bc9e5a7a34518fa7989fb6988307d7ef9dfce9dbcd61575ad1106d4b51
                                                                                                        • Instruction Fuzzy Hash: 0EE012E93042015BF700EA6599C1B2F22DCDB44315F00446ABD44CA28BE678CC048B29
                                                                                                        APIs
                                                                                                        • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                                                                                                        • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Virtual$AllocFree
                                                                                                        • String ID:
                                                                                                        • API String ID: 2087232378-0
                                                                                                        • Opcode ID: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                                                                                                        • Instruction ID: 119661fe7174a079321c86e78af40791ac039b5eb8373b45468023a5ba433726
                                                                                                        • Opcode Fuzzy Hash: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                                                                                                        • Instruction Fuzzy Hash: F7F08272A0063067EB60596A4C81B5359859BC5B94F154076FD09FF3E9D6B58C0142A9
                                                                                                        APIs
                                                                                                        • GetSystemDefaultLCID.KERNEL32(00000000,00408712), ref: 004085FB
                                                                                                          • Part of subcall function 00406DEC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00406E09
                                                                                                          • Part of subcall function 00408568: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,00408633,?,00000000,00408712), ref: 00408586
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: DefaultInfoLoadLocaleStringSystem
                                                                                                        • String ID:
                                                                                                        • API String ID: 1658689577-0
                                                                                                        • Opcode ID: 92125e52594e5bc8ee6d97e09480d95589045c4468e862feaba19903f63d3f1d
                                                                                                        • Instruction ID: 9026c6f0acc6bf601755118861b832b1e3c4c92574a9a05948c89544872af2a3
                                                                                                        • Opcode Fuzzy Hash: 92125e52594e5bc8ee6d97e09480d95589045c4468e862feaba19903f63d3f1d
                                                                                                        • Instruction Fuzzy Hash: 47314E35E00109ABCB00EB55CC819EEB779EF84314F558577E815BB286EB38AA018B98
                                                                                                        APIs
                                                                                                        • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 0041FC39
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InfoScroll
                                                                                                        • String ID:
                                                                                                        • API String ID: 629608716-0
                                                                                                        • Opcode ID: a0ce2aaa01497ac04468ea6ac7a83421c49688bcbeeff2d3e991700215f3b25f
                                                                                                        • Instruction ID: 6365c2cd079840e4170b7c9ce409c3d873e807bce8729d2e10e5c00059922083
                                                                                                        • Opcode Fuzzy Hash: a0ce2aaa01497ac04468ea6ac7a83421c49688bcbeeff2d3e991700215f3b25f
                                                                                                        • Instruction Fuzzy Hash: D8214FB1608746AFC351DF3984407A6BBE4BB48344F14893EE498C3741E778E99ACBD6
                                                                                                        APIs
                                                                                                          • Part of subcall function 0041EEA4: GetCurrentThreadId.KERNEL32 ref: 0041EEF3
                                                                                                          • Part of subcall function 0041EEA4: EnumThreadWindows.USER32(00000000,0041EE54,00000000), ref: 0041EEF9
                                                                                                        • SHPathPrepareForWriteA.SHELL32(00000000,00000000,00000000,00000000,00000000,0046C4AE,?,00000000,?,?,0046C6C0,?,00000000,0046C734), ref: 0046C492
                                                                                                          • Part of subcall function 0041EF58: IsWindow.USER32(?), ref: 0041EF66
                                                                                                          • Part of subcall function 0041EF58: EnableWindow.USER32(?,00000001), ref: 0041EF75
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ThreadWindow$CurrentEnableEnumPathPrepareWindowsWrite
                                                                                                        • String ID:
                                                                                                        • API String ID: 3319771486-0
                                                                                                        • Opcode ID: 0af19ab3550c8734ef4e1cf2f84aef4c41dad365f35295dd8d2c2646a272cfa9
                                                                                                        • Instruction ID: eef1953176fed27c4f60a3b97998f4e8fb1447464a393d6256780c84e8a913cd
                                                                                                        • Opcode Fuzzy Hash: 0af19ab3550c8734ef4e1cf2f84aef4c41dad365f35295dd8d2c2646a272cfa9
                                                                                                        • Instruction Fuzzy Hash: 5AF0B471248300BFE705DF62ECA6B35B6E8D748714F61047BF40886590E97D5844D51E
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FileWrite
                                                                                                        • String ID:
                                                                                                        • API String ID: 3934441357-0
                                                                                                        • Opcode ID: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                                                        • Instruction ID: 51b66c86ab1fb2ed9abdb0db83839a26410808368eb32e0cb4295e2ee82716ff
                                                                                                        • Opcode Fuzzy Hash: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                                                        • Instruction Fuzzy Hash: 09F04970608109EBBB1CCF58D0618AF7BA0EB48300F2080AFE907C7BA0D634AA80D658
                                                                                                        APIs
                                                                                                        • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,00000000,00400000,?), ref: 00416585
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateWindow
                                                                                                        • String ID:
                                                                                                        • API String ID: 716092398-0
                                                                                                        • Opcode ID: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                                                                                                        • Instruction ID: 158b8484bb218b41c698b3aa21f26e2dd86497bc01e640ef524e7c8f4c0ee3c6
                                                                                                        • Opcode Fuzzy Hash: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                                                                                                        • Instruction Fuzzy Hash: 4BF019B2200510AFDB84DE9CD9C0F9773ECEB0C210B0481A6FA08CB21AD220EC108BB0
                                                                                                        APIs
                                                                                                        • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004149EF
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CallbackDispatcherUser
                                                                                                        • String ID:
                                                                                                        • API String ID: 2492992576-0
                                                                                                        • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                                                        • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
                                                                                                        • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                                                        • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
                                                                                                        APIs
                                                                                                        • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00450804
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateFile
                                                                                                        • String ID:
                                                                                                        • API String ID: 823142352-0
                                                                                                        • Opcode ID: ce99838f7be0491c6923214398908b2fd93372403a84c7b432a549debe4dc153
                                                                                                        • Instruction ID: 52eb814c7c241dc182afdc6c3e242d4e4c9a4e6d94000e289351c80ae23ff87c
                                                                                                        • Opcode Fuzzy Hash: ce99838f7be0491c6923214398908b2fd93372403a84c7b432a549debe4dc153
                                                                                                        • Instruction Fuzzy Hash: 53E012B53541483EE780EEAD6C42F9777DC971A714F008037B998D7341D461DD158BA8
                                                                                                        APIs
                                                                                                        • GetFileAttributesA.KERNEL32(00000000,00000000,0042CD14,?,00000001,?,?,00000000,?,0042CD66,00000000,00452A25,00000000,00452A46,?,00000000), ref: 0042CCF7
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AttributesFile
                                                                                                        • String ID:
                                                                                                        • API String ID: 3188754299-0
                                                                                                        • Opcode ID: 2e3447488e8940f063bbcfc4a9008e9bc81ad59ac090e4e62a8f5aa92ecca264
                                                                                                        • Instruction ID: d3c11148bbbe1678040d416a6bc301cfea82702c80b798926358c5e84281cc0e
                                                                                                        • Opcode Fuzzy Hash: 2e3447488e8940f063bbcfc4a9008e9bc81ad59ac090e4e62a8f5aa92ecca264
                                                                                                        • Instruction Fuzzy Hash: 80E065B1304304BFD701EB66EC92A5EBAACDB49754BA14876B50097592D5B86E008468
                                                                                                        APIs
                                                                                                        • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453273,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8E7
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FormatMessage
                                                                                                        • String ID:
                                                                                                        • API String ID: 1306739567-0
                                                                                                        • Opcode ID: 07eb917982e44065cc90d67cadef310e262c4caec6bcfbb1197f6d5f5d2cfc19
                                                                                                        • Instruction ID: fbc307da5c1359fbfbc351051067b699ae1438aedf6613c80dda169529e76e7e
                                                                                                        • Opcode Fuzzy Hash: 07eb917982e44065cc90d67cadef310e262c4caec6bcfbb1197f6d5f5d2cfc19
                                                                                                        • Instruction Fuzzy Hash: BCE0206278431116F2353416AC47B77150E43C0708F944027BB90DF3D3D6AF9945D25E
                                                                                                        APIs
                                                                                                        • GetTextExtentPointA.GDI32(?,00000000,00000000), ref: 0041AF9B
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ExtentPointText
                                                                                                        • String ID:
                                                                                                        • API String ID: 566491939-0
                                                                                                        • Opcode ID: fe3873e992a20e622ffaf78f93863b288a9be0a8311253c2d6346deae250c6a6
                                                                                                        • Instruction ID: 6b43be1268843882f9474f888990ee0a0f71ddbfb678ee1088bae751a0726d8f
                                                                                                        • Opcode Fuzzy Hash: fe3873e992a20e622ffaf78f93863b288a9be0a8311253c2d6346deae250c6a6
                                                                                                        • Instruction Fuzzy Hash: E3E086F13097102BD600E67E1DC19DB77DC8A483697148177F458E7392D62DDE1A43AE
                                                                                                        APIs
                                                                                                        • CreateWindowExA.USER32(00000000,0042367C,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00406311
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateWindow
                                                                                                        • String ID:
                                                                                                        • API String ID: 716092398-0
                                                                                                        • Opcode ID: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                                                        • Instruction ID: 53e57476791a39574122dfc8a3f58f2f78c4a621b5a82e38d1c80b15216a1e52
                                                                                                        • Opcode Fuzzy Hash: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                                                        • Instruction Fuzzy Hash: EEE0FEB2214209BBDB00DE8ADCC1DABB7ACFB4C654F808105BB1C972428275AC608B71
                                                                                                        APIs
                                                                                                        • RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE10
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Create
                                                                                                        • String ID:
                                                                                                        • API String ID: 2289755597-0
                                                                                                        • Opcode ID: 296f4a6b1841180fcb6525c1425398a2afe0618770c3240f8adf4a5c8222c494
                                                                                                        • Instruction ID: 68673b5cf84413dff1d7ecec16939cb2303f89f305828e6cd22260af4b89741b
                                                                                                        • Opcode Fuzzy Hash: 296f4a6b1841180fcb6525c1425398a2afe0618770c3240f8adf4a5c8222c494
                                                                                                        • Instruction Fuzzy Hash: EDE07EB2610119AF9B40DE8CDC81EEB37ADAB1D350F404016FA08E7200C2B4EC519BB4
                                                                                                        APIs
                                                                                                        • FindClose.KERNEL32(00000000,000000FF,0047096C,00000000,00471782,?,00000000,004717CB,?,00000000,00471904,?,00000000,?,00000000), ref: 00454C0E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseFind
                                                                                                        • String ID:
                                                                                                        • API String ID: 1863332320-0
                                                                                                        • Opcode ID: 6665614e34a0f7cff573ca1669b2a109aa27f3c0ddffd1931b228eca5c2d9aab
                                                                                                        • Instruction ID: 5c2dbd3a099336849a47a332199978da45cb785deb8a29a76394180ab3bc5383
                                                                                                        • Opcode Fuzzy Hash: 6665614e34a0f7cff573ca1669b2a109aa27f3c0ddffd1931b228eca5c2d9aab
                                                                                                        • Instruction Fuzzy Hash: A1E09BB09097004BC715DF39858031A76D19FC9325F05C96AEC99CF3D7E77D84454617
                                                                                                        APIs
                                                                                                        • KiUserCallbackDispatcher.NTDLL(004959E6,?,00495A08,?,?,00000000,004959E6,?,?), ref: 0041469B
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CallbackDispatcherUser
                                                                                                        • String ID:
                                                                                                        • API String ID: 2492992576-0
                                                                                                        • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                                                        • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
                                                                                                        • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                                                        • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
                                                                                                        APIs
                                                                                                        • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00406F24
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FileWrite
                                                                                                        • String ID:
                                                                                                        • API String ID: 3934441357-0
                                                                                                        • Opcode ID: 4c02731fe18b0a47ab7745946c5e8dd4c7dfafdb2aa22804bebcbb41d9412fbb
                                                                                                        • Instruction ID: adeaf4ebd0e6cd94d64be6b3cb299443ba394f13a0b1cd3d8337db6b6af80796
                                                                                                        • Opcode Fuzzy Hash: 4c02731fe18b0a47ab7745946c5e8dd4c7dfafdb2aa22804bebcbb41d9412fbb
                                                                                                        • Instruction Fuzzy Hash: 53D012722091506AD220965A6C44EAB6BDCCBC5770F11063AB558C2181D7209C01C675
                                                                                                        APIs
                                                                                                          • Part of subcall function 004235F8: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 0042360D
                                                                                                        • ShowWindow.USER32(00410460,00000009,?,00000000,0041EDA4,0042393A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00423667
                                                                                                          • Part of subcall function 00423628: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 00423644
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InfoParametersSystem$ShowWindow
                                                                                                        • String ID:
                                                                                                        • API String ID: 3202724764-0
                                                                                                        • Opcode ID: 749b279e1c5e0ab7b3e77853442b745bf30ea7cb0c28c018a636783dda1148f2
                                                                                                        • Instruction ID: 3e39ddd90fb628193caaea160b6f4ed5bf244f394cc2da11a07db6b12dca8b82
                                                                                                        • Opcode Fuzzy Hash: 749b279e1c5e0ab7b3e77853442b745bf30ea7cb0c28c018a636783dda1148f2
                                                                                                        • Instruction Fuzzy Hash: 34D05E123821703142307ABB280699B46EC8D822EB389043BB5449B312ED5DCE01116C
                                                                                                        APIs
                                                                                                        • SetWindowTextA.USER32(?,00000000), ref: 004242DC
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: TextWindow
                                                                                                        • String ID:
                                                                                                        • API String ID: 530164218-0
                                                                                                        • Opcode ID: 968e2600307bd84f4d65718215a4df57ccfa9b7919b98356d7a542cd4e907fd2
                                                                                                        • Instruction ID: e359d8c046b4275bb87a72ac3440150ee0889cd0e7de0465f76ccf46c1161c2e
                                                                                                        • Opcode Fuzzy Hash: 968e2600307bd84f4d65718215a4df57ccfa9b7919b98356d7a542cd4e907fd2
                                                                                                        • Instruction Fuzzy Hash: 81D05EE27011602BCB01BAED54C4AC667CC9B8D25AB1840BBF904EF257D638CE40C398
                                                                                                        APIs
                                                                                                        • KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467828,00000000,00000000,00000000,0000000C,00000000), ref: 00466B58
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CallbackDispatcherUser
                                                                                                        • String ID:
                                                                                                        • API String ID: 2492992576-0
                                                                                                        • Opcode ID: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                                                        • Instruction ID: a3a9c25b9c80179eca176ae0059a0aa24e3542550d9dc9bac8dced773014ab2a
                                                                                                        • Opcode Fuzzy Hash: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                                                        • Instruction Fuzzy Hash: 0ED09272210A109F8364CAADC9C4C97B3ECEF4C2213004659E54AC3B15D664FC018BA0
                                                                                                        APIs
                                                                                                        • GetFileAttributesA.KERNEL32(00000000,00000000,004515CB,00000000), ref: 0042CD2F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AttributesFile
                                                                                                        • String ID:
                                                                                                        • API String ID: 3188754299-0
                                                                                                        • Opcode ID: 699a035a793c66476b33cfcb292e18e8433149420fa0246697406cd7a61acf8b
                                                                                                        • Instruction ID: 53db4a1afaa3b7bebcc80daf879f764776582c58df104e6651e2d127eece83ed
                                                                                                        • Opcode Fuzzy Hash: 699a035a793c66476b33cfcb292e18e8433149420fa0246697406cd7a61acf8b
                                                                                                        • Instruction Fuzzy Hash: 48C08CE03222001A9E60A6BD2CC551F06CC891423A3A41E3BB129EB2E2D23D88162818
                                                                                                        APIs
                                                                                                        • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040A6D4,0040CC80,?,00000000,?), ref: 00406EDD
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateFile
                                                                                                        • String ID:
                                                                                                        • API String ID: 823142352-0
                                                                                                        • Opcode ID: d487f09bce5ab2446fefe52ff91139140134d323c8d44495a9ab4cbc0f9c4527
                                                                                                        • Instruction ID: fbce42704b7dd2fd8be74a622cf743b4adaa06f64be9adac3ea2875d17ee2119
                                                                                                        • Opcode Fuzzy Hash: d487f09bce5ab2446fefe52ff91139140134d323c8d44495a9ab4cbc0f9c4527
                                                                                                        • Instruction Fuzzy Hash: EAC048A13C130032F92035A60C87F16008C5754F0AE60C43AB740BF1C2D8E9A818022C
                                                                                                        APIs
                                                                                                        • SetEndOfFile.KERNEL32(?,?,0045C342,00000000,0045C4CD,?,00000000,00000002,00000002), ref: 00450933
                                                                                                          • Part of subcall function 004506B4: GetLastError.KERNEL32(004504D0,00450776,?,00000000,?,00497E2C,00000001,00000000,00000002,00000000,00497F8D,?,?,00000005,00000000,00497FC1), ref: 004506B7
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorFileLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 734332943-0
                                                                                                        • Opcode ID: dfd6122944db5b319254e7b77af95d7469dcf5406d44b15aeae4525e96e42585
                                                                                                        • Instruction ID: 9573b676cf6dd5fef234c73c81a1a5d02d78d5ca05287b50762f3c98dcfac2da
                                                                                                        • Opcode Fuzzy Hash: dfd6122944db5b319254e7b77af95d7469dcf5406d44b15aeae4525e96e42585
                                                                                                        • Instruction Fuzzy Hash: 1AC04CA5700211479F10A6BA85C1A0662D86A5D3157144066BD08CF207D668D8148A18
                                                                                                        APIs
                                                                                                        • SetCurrentDirectoryA.KERNEL32(00000000,?,00497DBA,00000000,00497F8D,?,?,00000005,00000000,00497FC1,?,?,00000000), ref: 004072B3
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CurrentDirectory
                                                                                                        • String ID:
                                                                                                        • API String ID: 1611563598-0
                                                                                                        • Opcode ID: 9cfe1b671e2ded52e2a4f1899edd371c25323ab6eac1b77aed394817f5a1d109
                                                                                                        • Instruction ID: 2ee9fcf0c2ecb8048618371478a38130c752a95b947e2a8aefd026f579ab26ad
                                                                                                        • Opcode Fuzzy Hash: 9cfe1b671e2ded52e2a4f1899edd371c25323ab6eac1b77aed394817f5a1d109
                                                                                                        • Instruction Fuzzy Hash: 33B012E03D120A2BCA0079FE4CC192A00CC46292163401B3B3006EB1C3D83DC8180824
                                                                                                        APIs
                                                                                                        • SetErrorMode.KERNEL32(?,0042E40D), ref: 0042E400
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorMode
                                                                                                        • String ID:
                                                                                                        • API String ID: 2340568224-0
                                                                                                        • Opcode ID: cb8e2ebd86b0ac1182f6c4657d989dfa6a466ad308997f4b3834ff3b1e7758f7
                                                                                                        • Instruction ID: 426ac138898b17598b25982f2c454791bd479401c65f9a69ae9baa170422678e
                                                                                                        • Opcode Fuzzy Hash: cb8e2ebd86b0ac1182f6c4657d989dfa6a466ad308997f4b3834ff3b1e7758f7
                                                                                                        • Instruction Fuzzy Hash: CDB09B7670C6105EE709D6D5B45552D63D4D7C57207E14477F010D2581D57D58054E18
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: DestroyWindow
                                                                                                        • String ID:
                                                                                                        • API String ID: 3375834691-0
                                                                                                        • Opcode ID: 1244af60e57b01067fe56da529b9c4312cbd500fa9ed17bad69dff1823a021af
                                                                                                        • Instruction ID: 4f6e5339ba6c71e81ef5aec1f6829bfe42d3c8de95bc03762545e97b2cddf6f9
                                                                                                        • Opcode Fuzzy Hash: 1244af60e57b01067fe56da529b9c4312cbd500fa9ed17bad69dff1823a021af
                                                                                                        • Instruction Fuzzy Hash: 1AA00275501500AADA00E7B5D849F7E2298BB44204FD905F9714897056C57C99008B55
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 2f87504b9b3c5ef8a424e08888e9b878f09f15df180bfdf00abd21092ab1bc52
                                                                                                        • Instruction ID: 41a6872630840156d23f43a697f0b10540748f54e9aa1b8241e7bbe25a2b1888
                                                                                                        • Opcode Fuzzy Hash: 2f87504b9b3c5ef8a424e08888e9b878f09f15df180bfdf00abd21092ab1bc52
                                                                                                        • Instruction Fuzzy Hash: 73517574E002099FDB00EFA9C892AAFBBF5EB49314F50817AE500E7351DB389D41CB98
                                                                                                        APIs
                                                                                                        • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDA4,?,0042388F,00423C0C,0041EDA4), ref: 0041F3E2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AllocVirtual
                                                                                                        • String ID:
                                                                                                        • API String ID: 4275171209-0
                                                                                                        • Opcode ID: f624f178b2757757f6ee0ed82108e7e17b49aa81eb1cfd09d0e3ddd3732ee692
                                                                                                        • Instruction ID: 3312bc658de40493dbbbdb628fa1ac862c14c743cb2aabe02eeb7d71ec829e14
                                                                                                        • Opcode Fuzzy Hash: f624f178b2757757f6ee0ed82108e7e17b49aa81eb1cfd09d0e3ddd3732ee692
                                                                                                        • Instruction Fuzzy Hash: D5115A752007059BCB20DF19D880B82FBE5EF98390F10C53BE9688B385D3B4E8458BA9
                                                                                                        APIs
                                                                                                        • GetLastError.KERNEL32(00000000,0045302D), ref: 0045300F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 1452528299-0
                                                                                                        • Opcode ID: 796ee09302341f2f0fe022b6b7ad64e2259239b3e6510a293da86372227c0e6a
                                                                                                        • Instruction ID: b902f5f71593d0acd8113edc39c0d5725662cc955bae9521e0e34912f41e4d76
                                                                                                        • Opcode Fuzzy Hash: 796ee09302341f2f0fe022b6b7ad64e2259239b3e6510a293da86372227c0e6a
                                                                                                        • Instruction Fuzzy Hash: 850170356042486FC701DF699C008EEFBE8EB4D76171082B7FC24C3382D7345E059664
                                                                                                        APIs
                                                                                                        • VirtualFree.KERNEL32(?,?,00004000,?,?,?,?,?,00401973), ref: 00401766
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FreeVirtual
                                                                                                        • String ID:
                                                                                                        • API String ID: 1263568516-0
                                                                                                        • Opcode ID: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                                                                                                        • Instruction ID: fd45504e6079eb3c344fd15592bdf3984e08e9418c18d248e8b2091ea2ac4f2a
                                                                                                        • Opcode Fuzzy Hash: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                                                                                                        • Instruction Fuzzy Hash: A10120766443148FC3109F29EDC0E2677E8D794378F15453EDA85673A1D37A6C0187D8
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseHandle
                                                                                                        • String ID:
                                                                                                        • API String ID: 2962429428-0
                                                                                                        • Opcode ID: 11f5b55454e2001d57305e4d26194660ee260494afc1ae4151642f59c6b90a28
                                                                                                        • Instruction ID: 073c3129693101c5e7833b7ffa09eca8aa7a1e81ff9bb2ce6bcaaab03392c7d4
                                                                                                        • Opcode Fuzzy Hash: 11f5b55454e2001d57305e4d26194660ee260494afc1ae4151642f59c6b90a28
                                                                                                        • Instruction Fuzzy Hash:
                                                                                                        APIs
                                                                                                        • GetVersion.KERNEL32(?,00418FF0,00000000,?,?,?,00000001), ref: 0041F126
                                                                                                        • SetErrorMode.KERNEL32(00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F142
                                                                                                        • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F14E
                                                                                                        • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F15C
                                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F18C
                                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1B5
                                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1CA
                                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1DF
                                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F1F4
                                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F209
                                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F21E
                                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F233
                                                                                                        • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F248
                                                                                                        • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F25D
                                                                                                        • FreeLibrary.KERNEL32(00000001,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F26F
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
                                                                                                        • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                                                                                                        • API String ID: 2323315520-3614243559
                                                                                                        • Opcode ID: 62814c6def9f01bce39a36d2c4270fbdb1234b3c2cb706e68bb71ccad2797809
                                                                                                        • Instruction ID: e724c2aa341d6685c6ab1c4031cb88844a897dd828fe35f3324890dc483947ec
                                                                                                        • Opcode Fuzzy Hash: 62814c6def9f01bce39a36d2c4270fbdb1234b3c2cb706e68bb71ccad2797809
                                                                                                        • Instruction Fuzzy Hash: 8E314FB2640700ABEB01EBB9AC46A6B3794F328724741093FB508D7192D77C5C55CF5C
                                                                                                        APIs
                                                                                                        • GetTickCount.KERNEL32 ref: 0045862F
                                                                                                        • QueryPerformanceCounter.KERNEL32(02253858,00000000,004588C2,?,?,02253858,00000000,?,00458FBE,?,02253858,00000000), ref: 00458638
                                                                                                        • GetSystemTimeAsFileTime.KERNEL32(02253858,02253858), ref: 00458642
                                                                                                        • GetCurrentProcessId.KERNEL32(?,02253858,00000000,004588C2,?,?,02253858,00000000,?,00458FBE,?,02253858,00000000), ref: 0045864B
                                                                                                        • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 004586C1
                                                                                                        • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,02253858,02253858), ref: 004586CF
                                                                                                        • CreateFileA.KERNEL32(00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,0045887E), ref: 00458717
                                                                                                        • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,0045886D,?,00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,0045887E), ref: 00458750
                                                                                                          • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                                                                        • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 004587F9
                                                                                                        • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 0045882F
                                                                                                        • CloseHandle.KERNEL32(000000FF,00458874,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00458867
                                                                                                          • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateHandle$CloseErrorFileLastNamedPipeProcessSystemTime$CountCounterCurrentDirectoryPerformanceQueryStateTick
                                                                                                        • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$helper %d 0x%x$i
                                                                                                        • API String ID: 770386003-3271284199
                                                                                                        • Opcode ID: a79b95222fdd7f93703faf8b41e336e667bfcfce42d59c7d41cb43afe138310a
                                                                                                        • Instruction ID: 54c9584e853abf465b9d0f30fdd509929e5717807e8393d963d4681616065440
                                                                                                        • Opcode Fuzzy Hash: a79b95222fdd7f93703faf8b41e336e667bfcfce42d59c7d41cb43afe138310a
                                                                                                        • Instruction Fuzzy Hash: 19710470A003449EDB11EB65CC45B9E77F4EB05705F1085BAF904FB282DB7899488F69
                                                                                                        APIs
                                                                                                          • Part of subcall function 00478370: GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02252BDC,?,?,?,02252BDC,00478534,00000000,00478652,?,?,-00000010,?), ref: 00478389
                                                                                                          • Part of subcall function 00478370: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0047838F
                                                                                                          • Part of subcall function 00478370: GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02252BDC,?,?,?,02252BDC,00478534,00000000,00478652,?,?,-00000010,?), ref: 004783A2
                                                                                                          • Part of subcall function 00478370: CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02252BDC,?,?,?,02252BDC), ref: 004783CC
                                                                                                          • Part of subcall function 00478370: CloseHandle.KERNEL32(00000000,?,?,?,02252BDC,00478534,00000000,00478652,?,?,-00000010,?), ref: 004783EA
                                                                                                          • Part of subcall function 00478448: GetCurrentDirectoryA.KERNEL32(00000104,?,00000000,004784DA,?,?,?,02252BDC,?,0047853C,00000000,00478652,?,?,-00000010,?), ref: 00478478
                                                                                                        • ShellExecuteEx.SHELL32(0000003C), ref: 0047858C
                                                                                                        • GetLastError.KERNEL32(00000000,00478652,?,?,-00000010,?), ref: 00478595
                                                                                                        • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 004785E2
                                                                                                        • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 00478606
                                                                                                        • CloseHandle.KERNEL32(00000000,00478637,00000000,00000000,000000FF,000000FF,00000000,00478630,?,00000000,00478652,?,?,-00000010,?), ref: 0047862A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Handle$CloseFile$AddressAttributesCodeCreateCurrentDirectoryErrorExecuteExitLastModuleMultipleObjectsProcProcessShellWait
                                                                                                        • String ID: <$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
                                                                                                        • API String ID: 883996979-221126205
                                                                                                        • Opcode ID: e395260aa41f9ccfe4acc1b6a7661f4649f54ca3d6eb9a5996b4c5021f667ff4
                                                                                                        • Instruction ID: b05a94d88e1d9ee0fbafe330a65326fe691daae9ca7e583bddfe233bc85c86e1
                                                                                                        • Opcode Fuzzy Hash: e395260aa41f9ccfe4acc1b6a7661f4649f54ca3d6eb9a5996b4c5021f667ff4
                                                                                                        • Instruction Fuzzy Hash: 0E314470A40208BEDB11EFE6C859ADEB7B8EB45718F50843FF508E7281DA7C99058B5D
                                                                                                        APIs
                                                                                                        • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 004229F4
                                                                                                        • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,00422BBE), ref: 00422A04
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: MessageSendShowWindow
                                                                                                        • String ID:
                                                                                                        • API String ID: 1631623395-0
                                                                                                        • Opcode ID: 7d35c436bdc301b114185cd71e9b34d3d25d314c488a7ae3a8b4f853deae8013
                                                                                                        • Instruction ID: 9e9026b6a08d43f4c34b0c014f83afec13b9727198b5f0eb67f7172f0d04fbcb
                                                                                                        • Opcode Fuzzy Hash: 7d35c436bdc301b114185cd71e9b34d3d25d314c488a7ae3a8b4f853deae8013
                                                                                                        • Instruction Fuzzy Hash: 90915171B04214BFDB11EFA9DA86F9D77F4AB04304F5500BAF504AB392CB78AE419B58
                                                                                                        APIs
                                                                                                        • IsIconic.USER32(?), ref: 00418393
                                                                                                        • GetWindowPlacement.USER32(?,0000002C), ref: 004183B0
                                                                                                        • GetWindowRect.USER32(?), ref: 004183CC
                                                                                                        • GetWindowLongA.USER32(?,000000F0), ref: 004183DA
                                                                                                        • GetWindowLongA.USER32(?,000000F8), ref: 004183EF
                                                                                                        • ScreenToClient.USER32(00000000), ref: 004183F8
                                                                                                        • ScreenToClient.USER32(00000000,?), ref: 00418403
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Window$ClientLongScreen$IconicPlacementRect
                                                                                                        • String ID: ,
                                                                                                        • API String ID: 2266315723-3772416878
                                                                                                        • Opcode ID: 093fbc58c9f2bb22a74bd7cb36b3f86111f4d6c014dbe9a16a5ffda61369e0f0
                                                                                                        • Instruction ID: 8875a2d430ef8be2c5346fa25315cde737655516302bc4d2344e38a88124d083
                                                                                                        • Opcode Fuzzy Hash: 093fbc58c9f2bb22a74bd7cb36b3f86111f4d6c014dbe9a16a5ffda61369e0f0
                                                                                                        • Instruction Fuzzy Hash: 2B112B71505201ABEB00DF69C885F9B77E8AF48314F04067EFD58DB296D738D900CB65
                                                                                                        APIs
                                                                                                        • GetCurrentProcess.KERNEL32(00000028), ref: 004555F3
                                                                                                        • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004555F9
                                                                                                        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00455612
                                                                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 00455639
                                                                                                        • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 0045563E
                                                                                                        • ExitWindowsEx.USER32(00000002,00000000), ref: 0045564F
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                                                        • String ID: SeShutdownPrivilege
                                                                                                        • API String ID: 107509674-3733053543
                                                                                                        • Opcode ID: e41b2ce6836bec360355d7b24c2a1717b910cfd1a437749fc580c6f152555136
                                                                                                        • Instruction ID: 23182b732e3c774e917f784577cc733395bd6f0e504c2650860deaf78f25ff04
                                                                                                        • Opcode Fuzzy Hash: e41b2ce6836bec360355d7b24c2a1717b910cfd1a437749fc580c6f152555136
                                                                                                        • Instruction Fuzzy Hash: CBF0C870294B41B9EA10A6718C17F3B21C89B40709F80083ABD05E90D3D7BDD40C4A2E
                                                                                                        APIs
                                                                                                        • GetProcAddress.KERNEL32(10000000,ISCryptGetVersion), ref: 0045D191
                                                                                                        • GetProcAddress.KERNEL32(10000000,ArcFourInit), ref: 0045D1A1
                                                                                                        • GetProcAddress.KERNEL32(10000000,ArcFourCrypt), ref: 0045D1B1
                                                                                                        • ISCryptGetVersion._ISCRYPT(10000000,ArcFourCrypt,10000000,ArcFourInit,10000000,ISCryptGetVersion,?,0047F96F,00000000,0047F998), ref: 0045D1D6
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc$CryptVersion
                                                                                                        • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                                                                                                        • API String ID: 1951258720-508647305
                                                                                                        • Opcode ID: dc81785b55ac876962535e0a2eb36b1dd730d24c9132c457d47d12d4ae2e21c2
                                                                                                        • Instruction ID: d394b6b565b4a55a8c16e24b867b534ad65140704dc94b035c924c7661ebf9a3
                                                                                                        • Opcode Fuzzy Hash: dc81785b55ac876962535e0a2eb36b1dd730d24c9132c457d47d12d4ae2e21c2
                                                                                                        • Instruction Fuzzy Hash: A2F030B0D41700CAD318EFF6AC957263B96EB9830AF14C03BA414C51A2D7794454DF2C
                                                                                                        APIs
                                                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,004981E2,?,?,00000000,0049B628,?,0049836C,00000000,004983C0,?,?,00000000,0049B628), ref: 004980FB
                                                                                                        • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 0049817E
                                                                                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,004981BA,?,00000000,?,00000000,004981E2,?,?,00000000,0049B628,?,0049836C,00000000), ref: 00498196
                                                                                                        • FindClose.KERNEL32(000000FF,004981C1,004981BA,?,00000000,?,00000000,004981E2,?,?,00000000,0049B628,?,0049836C,00000000,004983C0), ref: 004981B4
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FileFind$AttributesCloseFirstNext
                                                                                                        • String ID: isRS-$isRS-???.tmp
                                                                                                        • API String ID: 134685335-3422211394
                                                                                                        • Opcode ID: 4cf053d52b7de9e99314ef9443aa0be7ff49bfb1b7c6e14e5d4b85c56af708b1
                                                                                                        • Instruction ID: fc6fb5a4e2302b333323d0d019d05182e8323e6fc1a1653111c694b95695a562
                                                                                                        • Opcode Fuzzy Hash: 4cf053d52b7de9e99314ef9443aa0be7ff49bfb1b7c6e14e5d4b85c56af708b1
                                                                                                        • Instruction Fuzzy Hash: E1316A719016186FCF10EF69CC42ADEBBBCDB45314F5044BBA808E3291DA3C9F458E58
                                                                                                        APIs
                                                                                                        • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457611
                                                                                                        • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457638
                                                                                                        • SetForegroundWindow.USER32(?), ref: 00457649
                                                                                                        • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,00457921,?,00000000,0045795D), ref: 0045790C
                                                                                                        Strings
                                                                                                        • Cannot evaluate variable because [Code] isn't running yet, xrefs: 0045778C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: MessagePostWindow$ForegroundNtdllProc_
                                                                                                        • String ID: Cannot evaluate variable because [Code] isn't running yet
                                                                                                        • API String ID: 2236967946-3182603685
                                                                                                        • Opcode ID: 74e42c9c2b67fd5adc195c0662b506aaf6a0f02139eddaf5114ff9c1448628c8
                                                                                                        • Instruction ID: 8776962154e21e4b1c8854f5ca4bcfaa90dd950cda3ad59ac2e2fede597431d6
                                                                                                        • Opcode Fuzzy Hash: 74e42c9c2b67fd5adc195c0662b506aaf6a0f02139eddaf5114ff9c1448628c8
                                                                                                        • Instruction Fuzzy Hash: 2B91D334608204DFEB15CF55E991F5ABBF5EB89704F2184BAE80497792C638AE04DB68
                                                                                                        APIs
                                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,00455F4B), ref: 00455E3C
                                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00455E42
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressHandleModuleProc
                                                                                                        • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                                                                        • API String ID: 1646373207-3712701948
                                                                                                        • Opcode ID: 409835b603e199d4170178d82c1615a1651ba94ec2cafac24c158ef3a131e909
                                                                                                        • Instruction ID: d81c9a8c7c52065d28d66f53e81ce4f313aa74f068c2efe820cb9bfc493487ae
                                                                                                        • Opcode Fuzzy Hash: 409835b603e199d4170178d82c1615a1651ba94ec2cafac24c158ef3a131e909
                                                                                                        • Instruction Fuzzy Hash: B0418671A04649AFCF01EFA5C8929EEB7B8EF48305F504567F804F7292D67C5E098B68
                                                                                                        APIs
                                                                                                        • IsIconic.USER32(?), ref: 00417D0F
                                                                                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D2D
                                                                                                        • GetWindowPlacement.USER32(?,0000002C), ref: 00417D63
                                                                                                        • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D8A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Window$Placement$Iconic
                                                                                                        • String ID: ,
                                                                                                        • API String ID: 568898626-3772416878
                                                                                                        • Opcode ID: b31359e3e3f4af84bc1879df8bb30ee95a40fb82c66b770674b351632ff57231
                                                                                                        • Instruction ID: e85585575f8c5a3e7823c55acc6b28d6d187d41511fbfc80546af44b70413e2d
                                                                                                        • Opcode Fuzzy Hash: b31359e3e3f4af84bc1879df8bb30ee95a40fb82c66b770674b351632ff57231
                                                                                                        • Instruction Fuzzy Hash: 4C2112716042089BDF10EF69D8C1AEA77B8AF48314F05456AFD18DF346D678DD84CBA8
                                                                                                        APIs
                                                                                                        • SetErrorMode.KERNEL32(00000001,00000000,0046433F), ref: 004641CD
                                                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,0046430A,?,00000001,00000000,0046433F), ref: 00464213
                                                                                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,004642EC,?,00000000,?,00000000,0046430A,?,00000001,00000000,0046433F), ref: 004642C8
                                                                                                        • FindClose.KERNEL32(000000FF,004642F3,004642EC,?,00000000,?,00000000,0046430A,?,00000001,00000000,0046433F), ref: 004642E6
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Find$File$CloseErrorFirstModeNext
                                                                                                        • String ID:
                                                                                                        • API String ID: 4011626565-0
                                                                                                        • Opcode ID: 1efd1e5842b6513eb7f92915edfbe8fc84401e145746a4d83abe9154eb57289a
                                                                                                        • Instruction ID: 9d9184480f8630aada0b530c6bd54f2fc26159d28d851f3c8c43bf9f92f270d6
                                                                                                        • Opcode Fuzzy Hash: 1efd1e5842b6513eb7f92915edfbe8fc84401e145746a4d83abe9154eb57289a
                                                                                                        • Instruction Fuzzy Hash: 77418370A00A18DBCF10EFA5DC959DEB7B8EB88305F5044AAF804A7341E7789E448E59
                                                                                                        APIs
                                                                                                        • SetErrorMode.KERNEL32(00000001,00000000,00463E99), ref: 00463D0D
                                                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,00463E6C,?,00000001,00000000,00463E99), ref: 00463D9C
                                                                                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,00463E4E,?,00000000,?,00000000,00463E6C,?,00000001,00000000,00463E99), ref: 00463E2E
                                                                                                        • FindClose.KERNEL32(000000FF,00463E55,00463E4E,?,00000000,?,00000000,00463E6C,?,00000001,00000000,00463E99), ref: 00463E48
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Find$File$CloseErrorFirstModeNext
                                                                                                        • String ID:
                                                                                                        • API String ID: 4011626565-0
                                                                                                        • Opcode ID: 7f0cfbd2c28eb096c2c7b79ad6d01cc7699265dce8ba217153498c446e9855ae
                                                                                                        • Instruction ID: 85e7d80bc36d7b3e80fea797042c039a90a2821ca6a16b1e557570abf42aa49f
                                                                                                        • Opcode Fuzzy Hash: 7f0cfbd2c28eb096c2c7b79ad6d01cc7699265dce8ba217153498c446e9855ae
                                                                                                        • Instruction Fuzzy Hash: 3A41B770A00A589FCB11EF65CC45ADEB7B8EB88705F4044BAF404A7381E67D9F48CE59
                                                                                                        APIs
                                                                                                        • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E956
                                                                                                        • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042E981
                                                                                                        • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E98E
                                                                                                        • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E996
                                                                                                        • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E99C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
                                                                                                        • String ID:
                                                                                                        • API String ID: 1177325624-0
                                                                                                        • Opcode ID: 00c40fca2cfdd97ba02e44e9efda7f487b55ec81a2bcf6d63bb4130569f45397
                                                                                                        • Instruction ID: 661b18b1de4eb1238568a50ab540e77c3175952f9b14320adb6d96c9b056064d
                                                                                                        • Opcode Fuzzy Hash: 00c40fca2cfdd97ba02e44e9efda7f487b55ec81a2bcf6d63bb4130569f45397
                                                                                                        • Instruction Fuzzy Hash: 80F090B23A17207AF620B57A5C86F7F418CCB89B68F10423BBA04FF1D1D9A85D0555AD
                                                                                                        APIs
                                                                                                        • IsIconic.USER32(?), ref: 0048397A
                                                                                                        • GetWindowLongA.USER32(00000000,000000F0), ref: 00483998
                                                                                                        • ShowWindow.USER32(00000000,00000005,00000000,000000F0,0049C0A8,00482E56,00482E8A,00000000,00482EAA,?,?,?,0049C0A8), ref: 004839BA
                                                                                                        • ShowWindow.USER32(00000000,00000000,00000000,000000F0,0049C0A8,00482E56,00482E8A,00000000,00482EAA,?,?,?,0049C0A8), ref: 004839CE
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Window$Show$IconicLong
                                                                                                        • String ID:
                                                                                                        • API String ID: 2754861897-0
                                                                                                        • Opcode ID: 388bc32bc28a7c539796bab44a6ba9bad50612e2c7d9e5998850325d2fd9b569
                                                                                                        • Instruction ID: 3cea9153c2b451a1fdc95e78a984a36fb28f479a74ffefb17a89e5a976076ef3
                                                                                                        • Opcode Fuzzy Hash: 388bc32bc28a7c539796bab44a6ba9bad50612e2c7d9e5998850325d2fd9b569
                                                                                                        • Instruction Fuzzy Hash: 160156B0705200ABEA00BF659CCBB5F22C55714745F44093BF4459B292CAADDA859B5C
                                                                                                        APIs
                                                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,00462824), ref: 004627A8
                                                                                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,00462804,?,00000000,?,00000000,00462824), ref: 004627E4
                                                                                                        • FindClose.KERNEL32(000000FF,0046280B,00462804,?,00000000,?,00000000,00462824), ref: 004627FE
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Find$File$CloseFirstNext
                                                                                                        • String ID:
                                                                                                        • API String ID: 3541575487-0
                                                                                                        • Opcode ID: b12316252c39c0105a03a3a2020ea099ca75c42189d8bae58c1ecd15a925fcd0
                                                                                                        • Instruction ID: e6acefadc91213b77ea930f6be1f86c6134c8588622ee3d3acab995ed1c325b6
                                                                                                        • Opcode Fuzzy Hash: b12316252c39c0105a03a3a2020ea099ca75c42189d8bae58c1ecd15a925fcd0
                                                                                                        • Instruction Fuzzy Hash: 87210831904B08BECB11EB65CC41ACEB7ACDB49304F5084B7E808E32A1F6789E44CE69
                                                                                                        APIs
                                                                                                        • IsIconic.USER32(?), ref: 004241E4
                                                                                                        • SetActiveWindow.USER32(?,?,?,0046CD53), ref: 004241F1
                                                                                                          • Part of subcall function 0042364C: ShowWindow.USER32(00410460,00000009,?,00000000,0041EDA4,0042393A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00423667
                                                                                                          • Part of subcall function 00423B14: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,022525AC,0042420A,?,?,?,0046CD53), ref: 00423B4F
                                                                                                        • SetFocus.USER32(00000000,?,?,?,0046CD53), ref: 0042421E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Window$ActiveFocusIconicShow
                                                                                                        • String ID:
                                                                                                        • API String ID: 649377781-0
                                                                                                        • Opcode ID: 1be179083055f96161d8b165ddd04f1e3bd56871e014c6a07f585ac04199aa1a
                                                                                                        • Instruction ID: c953833529836f01456b8f788e47b4b7c36f7a841d6c6df07f57e62630513da6
                                                                                                        • Opcode Fuzzy Hash: 1be179083055f96161d8b165ddd04f1e3bd56871e014c6a07f585ac04199aa1a
                                                                                                        • Instruction Fuzzy Hash: 8CF030B170012097CB10BFAAA8C5B9676A8AB48344F5500BBBD05DF357CA7CDC018778
                                                                                                        APIs
                                                                                                        • IsIconic.USER32(?), ref: 00417D0F
                                                                                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D2D
                                                                                                        • GetWindowPlacement.USER32(?,0000002C), ref: 00417D63
                                                                                                        • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D8A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Window$Placement$Iconic
                                                                                                        • String ID:
                                                                                                        • API String ID: 568898626-0
                                                                                                        • Opcode ID: 19084698f29920acc68274fefc6d1be37826273bcf8ca1bc36e8902df026f6c2
                                                                                                        • Instruction ID: d9358ea7cd183770b33139a8ac7b7a0a70302bd2c01e5fc8313c3e2814ac7f2c
                                                                                                        • Opcode Fuzzy Hash: 19084698f29920acc68274fefc6d1be37826273bcf8ca1bc36e8902df026f6c2
                                                                                                        • Instruction Fuzzy Hash: 33012C71204108ABDB10EE59D8C1EF673A8AF45724F154566FD19DF242D639ED8087A8
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CaptureIconic
                                                                                                        • String ID:
                                                                                                        • API String ID: 2277910766-0
                                                                                                        • Opcode ID: c22591b8c3f2be6e3e416ff0957708157ed46c57fff49ed7de8fa542590db40d
                                                                                                        • Instruction ID: 6cb7601519473143bf4e876ebf6758ccc8fc4fa751d6c6e0357a6193460a6b05
                                                                                                        • Opcode Fuzzy Hash: c22591b8c3f2be6e3e416ff0957708157ed46c57fff49ed7de8fa542590db40d
                                                                                                        • Instruction Fuzzy Hash: 0AF0A4723056425BD730AB2EC984AB762F69F84314B14403BE419CBFA1EB3CDCC08798
                                                                                                        APIs
                                                                                                        • IsIconic.USER32(?), ref: 0042419B
                                                                                                          • Part of subcall function 00423A84: EnumWindows.USER32(00423A1C), ref: 00423AA8
                                                                                                          • Part of subcall function 00423A84: GetWindow.USER32(?,00000003), ref: 00423ABD
                                                                                                          • Part of subcall function 00423A84: GetWindowLongA.USER32(?,000000EC), ref: 00423ACC
                                                                                                          • Part of subcall function 00423A84: SetWindowPos.USER32(00000000,\AB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241AB,?,?,00423D73), ref: 00423B02
                                                                                                        • SetActiveWindow.USER32(?,?,?,00423D73,00000000,0042415C), ref: 004241AF
                                                                                                          • Part of subcall function 0042364C: ShowWindow.USER32(00410460,00000009,?,00000000,0041EDA4,0042393A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00423667
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Window$ActiveEnumIconicLongShowWindows
                                                                                                        • String ID:
                                                                                                        • API String ID: 2671590913-0
                                                                                                        • Opcode ID: b2ff140757208bd7b7cc33ac29151dbeb423d1cdddd3b288bc041a56f1810338
                                                                                                        • Instruction ID: ce5d4440ec1c13bcfda566247f28ea27228b22b89c70f7a48f218b5e8bc86154
                                                                                                        • Opcode Fuzzy Hash: b2ff140757208bd7b7cc33ac29151dbeb423d1cdddd3b288bc041a56f1810338
                                                                                                        • Instruction Fuzzy Hash: 55E01AA070011087DB10AFAADCC8B9632A9BB48304F55017ABD49CF35BD63CC8608724
                                                                                                        APIs
                                                                                                        • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,004127D5), ref: 004127C3
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: NtdllProc_Window
                                                                                                        • String ID:
                                                                                                        • API String ID: 4255912815-0
                                                                                                        • Opcode ID: 120c9c179850e2d77f2b5158c289480559fb4752f9becda92d3f5c4f199058c9
                                                                                                        • Instruction ID: 2c049f03cfb376e3baa0368465928f91904f6d03483072bf0e6cb5f6a46bccc5
                                                                                                        • Opcode Fuzzy Hash: 120c9c179850e2d77f2b5158c289480559fb4752f9becda92d3f5c4f199058c9
                                                                                                        • Instruction Fuzzy Hash: 4A5102357082048FD710DB6ADA80A9BF3E5EF98314B2082BBD814C77A1D7B8AD91C75D
                                                                                                        APIs
                                                                                                        • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 00478C0E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: NtdllProc_Window
                                                                                                        • String ID:
                                                                                                        • API String ID: 4255912815-0
                                                                                                        • Opcode ID: 35b14883da97521222dd4ba63ab43259808bc2fdd283b26f07d3c05bbd11cdae
                                                                                                        • Instruction ID: 8fc52e73ba06cc46e730b07d7f7f94568764801a7b8f51cd1014d1f63996c257
                                                                                                        • Opcode Fuzzy Hash: 35b14883da97521222dd4ba63ab43259808bc2fdd283b26f07d3c05bbd11cdae
                                                                                                        • Instruction Fuzzy Hash: EC4148B5A44104DFCB10CF99C6888AAB7F5FB49310B64C99AF848DB701D738EE45DB58
                                                                                                        APIs
                                                                                                        • ArcFourCrypt._ISCRYPT(?,?,?,0046DEA4,?,?,0046DEA4,00000000), ref: 0045D247
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CryptFour
                                                                                                        • String ID:
                                                                                                        • API String ID: 2153018856-0
                                                                                                        • Opcode ID: 60613f318f2e56de1b1058283c26d55875caf569050bffc963c4b4a7e30f6a75
                                                                                                        • Instruction ID: 5effe0378c810cd07e0217cdc1e7a72ed78fe315a0c34b067f2c35eeb24cdbba
                                                                                                        • Opcode Fuzzy Hash: 60613f318f2e56de1b1058283c26d55875caf569050bffc963c4b4a7e30f6a75
                                                                                                        • Instruction Fuzzy Hash: D0C09BF200420CBF650057D5ECC9C77B75CE6586547408126F7048210195726C104574
                                                                                                        APIs
                                                                                                        • ArcFourCrypt._ISCRYPT(?,00000000,00000000,000003E8,0046DB14,?,0046DCF5), ref: 0045D25A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CryptFour
                                                                                                        • String ID:
                                                                                                        • API String ID: 2153018856-0
                                                                                                        • Opcode ID: d774fb8793e7b9215c4f3788321c424c537fe54849dfeb2a35b58218e4d2cefe
                                                                                                        • Instruction ID: 17600df93846144bfd8e61cd07b91608ca2a028cf3222f5d1774599e6ed580aa
                                                                                                        • Opcode Fuzzy Hash: d774fb8793e7b9215c4f3788321c424c537fe54849dfeb2a35b58218e4d2cefe
                                                                                                        • Instruction Fuzzy Hash: B7A002F0B80300BAFD2057F15E5EF26252C97D0F01F2084657306E90D085A56400853C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3292280048.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3292232210.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3292321455.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_10000000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                                                        • Instruction ID: 1c94840b05858ddf3503627acbaac9226f9c4a6e1659969bf0a936c2f155f8a0
                                                                                                        • Opcode Fuzzy Hash: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                                                        • Instruction Fuzzy Hash: FF11303254D3D28FC305CF2894506D6FFE4AF6A640F194AAEE1D45B203C2659549C7A2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3292280048.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3292232210.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3292321455.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_10000000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                                                        • Instruction ID: 837d35c9df4effc004866add7a9100bdfed479f04b3922bb4bd4c5469ecd81ba
                                                                                                        • Opcode Fuzzy Hash: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                                                        • Instruction Fuzzy Hash:
                                                                                                        APIs
                                                                                                          • Part of subcall function 0044B604: GetVersionExA.KERNEL32(00000094), ref: 0044B621
                                                                                                        • LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F775,00498BF2), ref: 0044B67F
                                                                                                        • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B697
                                                                                                        • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6A9
                                                                                                        • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6BB
                                                                                                        • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6CD
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6DF
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6F1
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B703
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B715
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B727
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B739
                                                                                                        • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B74B
                                                                                                        • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B75D
                                                                                                        • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B76F
                                                                                                        • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B781
                                                                                                        • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B793
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7A5
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7B7
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044B7C9
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044B7DB
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044B7ED
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044B7FF
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044B811
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044B823
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044B835
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044B847
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044B859
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044B86B
                                                                                                        • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044B87D
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044B88F
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044B8A1
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044B8B3
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044B8C5
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044B8D7
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044B8E9
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044B8FB
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044B90D
                                                                                                        • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044B91F
                                                                                                        • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044B931
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044B943
                                                                                                        • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044B955
                                                                                                        • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044B967
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044B979
                                                                                                        • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044B98B
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044B99D
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044B9AF
                                                                                                        • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044B9C1
                                                                                                        • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044B9D3
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc$LibraryLoadVersion
                                                                                                        • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                                                                                        • API String ID: 1968650500-2910565190
                                                                                                        • Opcode ID: 4248c38413e99d9464b79edb7fe9b1fdc4fa56b35b8262d24df0eec612bb70b6
                                                                                                        • Instruction ID: e93aa9000a3b975727f71862fff1c9a8a52c50bca2d3d110ef64c9f3a3b13d35
                                                                                                        • Opcode Fuzzy Hash: 4248c38413e99d9464b79edb7fe9b1fdc4fa56b35b8262d24df0eec612bb70b6
                                                                                                        • Instruction Fuzzy Hash: D391A8F0A40B11ABEB00EFB5AD96A2A3BA8EB15714310067BB454DF295D778DC108FDD
                                                                                                        APIs
                                                                                                        • GetDC.USER32(00000000), ref: 0041CA40
                                                                                                        • CreateCompatibleDC.GDI32(?), ref: 0041CA4C
                                                                                                        • CreateBitmap.GDI32(0041A944,?,00000001,00000001,00000000), ref: 0041CA70
                                                                                                        • CreateCompatibleBitmap.GDI32(?,0041A944,?), ref: 0041CA80
                                                                                                        • SelectObject.GDI32(0041CE3C,00000000), ref: 0041CA9B
                                                                                                        • FillRect.USER32(0041CE3C,?,?), ref: 0041CAD6
                                                                                                        • SetTextColor.GDI32(0041CE3C,00000000), ref: 0041CAEB
                                                                                                        • SetBkColor.GDI32(0041CE3C,00000000), ref: 0041CB02
                                                                                                        • PatBlt.GDI32(0041CE3C,00000000,00000000,0041A944,?,00FF0062), ref: 0041CB18
                                                                                                        • CreateCompatibleDC.GDI32(?), ref: 0041CB2B
                                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 0041CB5C
                                                                                                        • SelectPalette.GDI32(00000000,00000000,00000001), ref: 0041CB74
                                                                                                        • RealizePalette.GDI32(00000000), ref: 0041CB7D
                                                                                                        • SelectPalette.GDI32(0041CE3C,00000000,00000001), ref: 0041CB8C
                                                                                                        • RealizePalette.GDI32(0041CE3C), ref: 0041CB95
                                                                                                        • SetTextColor.GDI32(00000000,00000000), ref: 0041CBAE
                                                                                                        • SetBkColor.GDI32(00000000,00000000), ref: 0041CBC5
                                                                                                        • BitBlt.GDI32(0041CE3C,00000000,00000000,0041A944,?,00000000,00000000,00000000,00CC0020), ref: 0041CBE1
                                                                                                        • SelectObject.GDI32(00000000,?), ref: 0041CBEE
                                                                                                        • DeleteDC.GDI32(00000000), ref: 0041CC04
                                                                                                          • Part of subcall function 0041A058: GetSysColor.USER32(?), ref: 0041A062
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ColorSelect$CreatePalette$CompatibleObject$BitmapRealizeText$DeleteFillRect
                                                                                                        • String ID:
                                                                                                        • API String ID: 269503290-0
                                                                                                        • Opcode ID: 8288b1a004c19d08e53adfd80f36b756ff19622159534b91a17c952f52f31838
                                                                                                        • Instruction ID: 91afdf38925dfcc0a19aef53af63d8b93a06df8cfedaf367688fa0d34ebdb442
                                                                                                        • Opcode Fuzzy Hash: 8288b1a004c19d08e53adfd80f36b756ff19622159534b91a17c952f52f31838
                                                                                                        • Instruction Fuzzy Hash: 01610071A44648AFDF10EBE9DC86FDFB7B8EB48704F10446AB504E7281D67CA940CB68
                                                                                                        APIs
                                                                                                        • CoCreateInstance.OLE32(00499A74,00000000,00000001,00499774,?,00000000,004569E3), ref: 0045667E
                                                                                                        • CoCreateInstance.OLE32(00499764,00000000,00000001,00499774,?,00000000,004569E3), ref: 004566A4
                                                                                                        • SysFreeString.OLEAUT32(00000000), ref: 0045685B
                                                                                                        Strings
                                                                                                        • {pf32}\, xrefs: 0045671E
                                                                                                        • CoCreateInstance, xrefs: 004566AF
                                                                                                        • IPropertyStore::SetValue(PKEY_AppUserModel_ID), xrefs: 00456840
                                                                                                        • IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption), xrefs: 004568CA
                                                                                                        • IShellLink::QueryInterface(IID_IPersistFile), xrefs: 00456904
                                                                                                        • IShellLink::QueryInterface(IID_IPropertyStore), xrefs: 004567BD
                                                                                                        • IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning), xrefs: 004567F1
                                                                                                        • IPropertyStore::Commit, xrefs: 004568E3
                                                                                                        • %ProgramFiles(x86)%\, xrefs: 0045672E
                                                                                                        • IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall), xrefs: 00456892
                                                                                                        • IPersistFile::Save, xrefs: 00456962
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateInstance$FreeString
                                                                                                        • String ID: %ProgramFiles(x86)%\$CoCreateInstance$IPersistFile::Save$IPropertyStore::Commit$IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)$IPropertyStore::SetValue(PKEY_AppUserModel_ID)$IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)$IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption)$IShellLink::QueryInterface(IID_IPersistFile)$IShellLink::QueryInterface(IID_IPropertyStore)${pf32}\
                                                                                                        • API String ID: 308859552-2363233914
                                                                                                        • Opcode ID: 26ac11ebc8d2bbba6934e2b7da4071208c956f88b3f37f3572524cf0602978ca
                                                                                                        • Instruction ID: 2d3acbfbfe5134b3b68b6dcde43dfe431d970b0eaffbfac770a5f5266a6492d0
                                                                                                        • Opcode Fuzzy Hash: 26ac11ebc8d2bbba6934e2b7da4071208c956f88b3f37f3572524cf0602978ca
                                                                                                        • Instruction Fuzzy Hash: 39B13170A00104AFDB50DFA9C845B9E7BF8AF09706F5540AAF804E7362DB78DD48CB69
                                                                                                        APIs
                                                                                                        • ShowWindow.USER32(?,00000005,00000000,00498768,?,?,00000000,?,00000000,00000000,?,00498B1F,00000000,00498B29,?,00000000), ref: 00498453
                                                                                                        • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498768,?,?,00000000,?,00000000,00000000,?,00498B1F,00000000), ref: 00498466
                                                                                                        • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498768,?,?,00000000,?,00000000,00000000), ref: 00498476
                                                                                                        • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00498497
                                                                                                        • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498768,?,?,00000000,?,00000000), ref: 004984A7
                                                                                                          • Part of subcall function 0042D44C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4DA,?,?,?,00000001,?,0045607E,00000000,004560E6), ref: 0042D481
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                                                                                                        • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup
                                                                                                        • API String ID: 2000705611-3672972446
                                                                                                        • Opcode ID: d895cb7c5264c7428a24ad32bd1f4b93e6c699b182eb53adebeee5f7002e5ba1
                                                                                                        • Instruction ID: 1a66146e65e487955493167600903b91e60bc3637ed1504a34615a6495e02ea1
                                                                                                        • Opcode Fuzzy Hash: d895cb7c5264c7428a24ad32bd1f4b93e6c699b182eb53adebeee5f7002e5ba1
                                                                                                        • Instruction Fuzzy Hash: 5191A434A042049FDF11EBA9DC52BAE7BE5EF4A304F5144BBF500AB692DE7C9C05CA19
                                                                                                        APIs
                                                                                                        • GetLastError.KERNEL32(00000000,0045A994,?,?,?,?,?,00000006,?,00000000,0049785D,?,00000000,00497900), ref: 0045A846
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast
                                                                                                        • String ID: .chm$.chw$.fts$.gid$.hlp$.lnk$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                                                                                                        • API String ID: 1452528299-3112430753
                                                                                                        • Opcode ID: 41204ac3778d0b79d3de2409b6c45a5b2ad533d11cb42b90e75a22724f80c331
                                                                                                        • Instruction ID: 43962401d403c06de7b31dde6fd87328655f81364e16ca473e433d379c6e1912
                                                                                                        • Opcode Fuzzy Hash: 41204ac3778d0b79d3de2409b6c45a5b2ad533d11cb42b90e75a22724f80c331
                                                                                                        • Instruction Fuzzy Hash: EC719070B002545BCB00EB6998417AE77A49F4931AF91896BFC01AB383DB7C9E1DC75E
                                                                                                        APIs
                                                                                                        • GetVersion.KERNEL32 ref: 0045CBDA
                                                                                                        • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045CBFA
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoW), ref: 0045CC07
                                                                                                        • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoW), ref: 0045CC14
                                                                                                        • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045CC22
                                                                                                          • Part of subcall function 0045CAC8: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0045CB67,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045CB41
                                                                                                        • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045CE15,?,?,00000000), ref: 0045CCDB
                                                                                                        • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045CE15,?,?,00000000), ref: 0045CCE4
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc$AllocateByteCharErrorHandleInitializeLastModuleMultiVersionWide
                                                                                                        • String ID: GetNamedSecurityInfoW$SetEntriesInAclW$SetNamedSecurityInfoW$W$advapi32.dll
                                                                                                        • API String ID: 59345061-4263478283
                                                                                                        • Opcode ID: a232fc9af4861a9c5d561c4cdd8364b97c4fb44f2e207c549b4316288fabcd11
                                                                                                        • Instruction ID: 99773ef8a3d0261052733c4904a47669a242c0659fe16ead1f438c4abb71ff4e
                                                                                                        • Opcode Fuzzy Hash: a232fc9af4861a9c5d561c4cdd8364b97c4fb44f2e207c549b4316288fabcd11
                                                                                                        • Instruction Fuzzy Hash: BD518471900308EFDB10DF99C881BEEBBB8EB48711F14806AF904E7241C678A945CFA9
                                                                                                        APIs
                                                                                                        • CreateCompatibleDC.GDI32(00000000), ref: 0041B3C3
                                                                                                        • CreateCompatibleDC.GDI32(00000000), ref: 0041B3CD
                                                                                                        • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B3DF
                                                                                                        • CreateBitmap.GDI32(0000000B,?,00000001,00000001,00000000), ref: 0041B3F6
                                                                                                        • GetDC.USER32(00000000), ref: 0041B402
                                                                                                        • CreateCompatibleBitmap.GDI32(00000000,0000000B,?), ref: 0041B42F
                                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 0041B455
                                                                                                        • SelectObject.GDI32(00000000,?), ref: 0041B470
                                                                                                        • SelectObject.GDI32(?,00000000), ref: 0041B47F
                                                                                                        • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4AB
                                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 0041B4B9
                                                                                                        • SelectObject.GDI32(?,00000000), ref: 0041B4C7
                                                                                                        • DeleteDC.GDI32(00000000), ref: 0041B4D0
                                                                                                        • DeleteDC.GDI32(?), ref: 0041B4D9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Object$CreateSelect$Compatible$BitmapDelete$ReleaseStretch
                                                                                                        • String ID:
                                                                                                        • API String ID: 644427674-0
                                                                                                        • Opcode ID: 9212dc48eb065078ffd6e64a0fe4b3e7e755c3ed7e1f96497366cc94fc87ddf9
                                                                                                        • Instruction ID: 0f3e5998203d07172116f12fa3fedaa120d09cd030f2870c51d139f455c41937
                                                                                                        • Opcode Fuzzy Hash: 9212dc48eb065078ffd6e64a0fe4b3e7e755c3ed7e1f96497366cc94fc87ddf9
                                                                                                        • Instruction Fuzzy Hash: E941AD71E44619AFDB10DAE9C846FEFB7BCEB08704F104466B614F7281D6786D408BA8
                                                                                                        APIs
                                                                                                          • Part of subcall function 0042C804: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C828
                                                                                                        • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00472D00
                                                                                                        • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 00472E07
                                                                                                        • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 00472E1D
                                                                                                        • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 00472E42
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
                                                                                                        • String ID: .lnk$.pif$.url$Desktop.ini$Filename: %s$target.lnk${group}\
                                                                                                        • API String ID: 971782779-3668018701
                                                                                                        • Opcode ID: 2d89b570042f54901974877e938fd47b21837ccabee8972bdab534961fdf4a04
                                                                                                        • Instruction ID: 7edda302242157afef40b0e7c7e05039b068dedd9e36cd510e855ba872eb221a
                                                                                                        • Opcode Fuzzy Hash: 2d89b570042f54901974877e938fd47b21837ccabee8972bdab534961fdf4a04
                                                                                                        • Instruction Fuzzy Hash: D0D14574A001489FDB11EFA9D981BDDBBF4AF08304F50816AF904B7392C778AE45CB69
                                                                                                        APIs
                                                                                                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                                        • RegQueryValueExA.ADVAPI32(0045AB6A,00000000,00000000,?,00000000,?,00000000,00454B0D,?,0045AB6A,00000003,00000000,00000000,00454B44), ref: 0045498D
                                                                                                          • Part of subcall function 0042E8C8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453273,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8E7
                                                                                                        • RegQueryValueExA.ADVAPI32(0045AB6A,00000000,00000000,00000000,?,00000004,00000000,00454A57,?,0045AB6A,00000000,00000000,?,00000000,?,00000000), ref: 00454A11
                                                                                                        • RegQueryValueExA.ADVAPI32(0045AB6A,00000000,00000000,00000000,?,00000004,00000000,00454A57,?,0045AB6A,00000000,00000000,?,00000000,?,00000000), ref: 00454A40
                                                                                                        Strings
                                                                                                        • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004548E4
                                                                                                        • , xrefs: 004548FE
                                                                                                        • RegOpenKeyEx, xrefs: 00454910
                                                                                                        • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004548AB
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: QueryValue$FormatMessageOpen
                                                                                                        • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                                                        • API String ID: 2812809588-1577016196
                                                                                                        • Opcode ID: 742d62a6869efcab47093dbd07b67c32618791e42156db71d55ecd28429abb8c
                                                                                                        • Instruction ID: 3b35aed17da8244e85d272d2923899a44a2159637523a8fd9e70e85f8d21f96a
                                                                                                        • Opcode Fuzzy Hash: 742d62a6869efcab47093dbd07b67c32618791e42156db71d55ecd28429abb8c
                                                                                                        • Instruction Fuzzy Hash: 23914871E44148ABDB10DF95C842BDEB7FCEB49309F50406BF900FB282D6789E458B69
                                                                                                        APIs
                                                                                                          • Part of subcall function 00459364: RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,004594A1,00000000,00459659,?,00000000,00000000,00000000), ref: 004593B1
                                                                                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459659,?,00000000,00000000,00000000), ref: 004594FF
                                                                                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459659,?,00000000,00000000,00000000), ref: 00459569
                                                                                                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00000001,00000000,00000000,00459659,?,00000000,00000000,00000000), ref: 004595D0
                                                                                                        Strings
                                                                                                        • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 00459583
                                                                                                        • SOFTWARE\Microsoft\.NETFramework\Policy\v4.0, xrefs: 004594B2
                                                                                                        • .NET Framework version %s not found, xrefs: 00459609
                                                                                                        • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 0045951C
                                                                                                        • v2.0.50727, xrefs: 0045955B
                                                                                                        • v1.1.4322, xrefs: 004595C2
                                                                                                        • v4.0.30319, xrefs: 004594F1
                                                                                                        • .NET Framework not found, xrefs: 0045961D
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Close$Open
                                                                                                        • String ID: .NET Framework not found$.NET Framework version %s not found$SOFTWARE\Microsoft\.NETFramework\Policy\v1.1$SOFTWARE\Microsoft\.NETFramework\Policy\v2.0$SOFTWARE\Microsoft\.NETFramework\Policy\v4.0$v1.1.4322$v2.0.50727$v4.0.30319
                                                                                                        • API String ID: 2976201327-446240816
                                                                                                        • Opcode ID: 06cdcde3b802fa8939e5b925d5f0cc04c3aa7329a2dd441772a6abba54712f42
                                                                                                        • Instruction ID: e7879d346446e6db82ad1067b50e8ffdd52b59a139ce3e0e88c8f748029a0227
                                                                                                        • Opcode Fuzzy Hash: 06cdcde3b802fa8939e5b925d5f0cc04c3aa7329a2dd441772a6abba54712f42
                                                                                                        • Instruction Fuzzy Hash: EB51A331A04148EBCB01DFA8C8A1BEE77A5DB59305F54447BA801DB353EA3D9E1ECB19
                                                                                                        APIs
                                                                                                        • CloseHandle.KERNEL32(?), ref: 00458A7B
                                                                                                        • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 00458A97
                                                                                                        • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 00458AA5
                                                                                                        • GetExitCodeProcess.KERNEL32(?), ref: 00458AB6
                                                                                                        • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458AFD
                                                                                                        • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458B19
                                                                                                        Strings
                                                                                                        • Helper process exited, but failed to get exit code., xrefs: 00458AEF
                                                                                                        • Helper isn't responding; killing it., xrefs: 00458A87
                                                                                                        • Stopping 64-bit helper process. (PID: %u), xrefs: 00458A6D
                                                                                                        • Helper process exited., xrefs: 00458AC5
                                                                                                        • Helper process exited with failure code: 0x%x, xrefs: 00458AE3
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                                                                                                        • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                                                                                                        • API String ID: 3355656108-1243109208
                                                                                                        • Opcode ID: 5acb86a21610ff93fc26a18ca7688f4a609edf5baed34ffefeefbdc5f868b4c1
                                                                                                        • Instruction ID: 3f2324d87e707cedf1d5c4e10b6e93e7b0b52df74c864805f1ac214018e434b5
                                                                                                        • Opcode Fuzzy Hash: 5acb86a21610ff93fc26a18ca7688f4a609edf5baed34ffefeefbdc5f868b4c1
                                                                                                        • Instruction Fuzzy Hash: 2F2130706087409AD720E779C44575BB6D49F08345F04CC2FF99AEB283DF78E8488B2A
                                                                                                        APIs
                                                                                                          • Part of subcall function 0042DDE4: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE10
                                                                                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,004546FF,?,00000000,004547C3), ref: 0045464F
                                                                                                        • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,004546FF,?,00000000,004547C3), ref: 0045478B
                                                                                                          • Part of subcall function 0042E8C8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453273,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8E7
                                                                                                        Strings
                                                                                                        • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454567
                                                                                                        • RegCreateKeyEx, xrefs: 004545C3
                                                                                                        • , xrefs: 004545B1
                                                                                                        • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454597
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseCreateFormatMessageQueryValue
                                                                                                        • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                                                        • API String ID: 2481121983-1280779767
                                                                                                        • Opcode ID: 1658ad98f5d652d8ab18f870bc50976d397f5a9f15be4283fc870004d2c294f4
                                                                                                        • Instruction ID: 93c55a0ab54dbcba353dd8d7ef9dbdddde8d62e860aeeeeaccb8ee2ace91ec52
                                                                                                        • Opcode Fuzzy Hash: 1658ad98f5d652d8ab18f870bc50976d397f5a9f15be4283fc870004d2c294f4
                                                                                                        • Instruction Fuzzy Hash: 49810F75A00209AFDB00DFD5C981BDEB7B8EB49309F10452AF900FB282D7789E45CB69
                                                                                                        APIs
                                                                                                          • Part of subcall function 004538BC: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,!nI,_iu,?,00000000,004539F6), ref: 004539AB
                                                                                                          • Part of subcall function 004538BC: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,!nI,_iu,?,00000000,004539F6), ref: 004539BB
                                                                                                        • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 00496CCD
                                                                                                        • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00496E21), ref: 00496CEE
                                                                                                        • CreateWindowExA.USER32(00000000,STATIC,00496E30,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 00496D15
                                                                                                        • SetWindowLongA.USER32(?,000000FC,004964A8), ref: 00496D28
                                                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00496DF4,?,?,000000FC,004964A8,00000000,STATIC,00496E30), ref: 00496D58
                                                                                                        • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00496DCC
                                                                                                        • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00496DF4,?,?,000000FC,004964A8,00000000), ref: 00496DD8
                                                                                                          • Part of subcall function 00453D30: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E17
                                                                                                        • DestroyWindow.USER32(?,00496DFB,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00496DF4,?,?,000000FC,004964A8,00000000,STATIC), ref: 00496DEE
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Window$File$CloseCreateHandle$AttributesCopyDestroyLongMultipleObjectsPrivateProfileStringWaitWrite
                                                                                                        • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                                                                                                        • API String ID: 1549857992-2312673372
                                                                                                        • Opcode ID: e4b2ecfcfa893ff17553470f1835d2c21342bacfaf5c8ca03e615e843d4af16f
                                                                                                        • Instruction ID: 18f462a79ff6f3765b6ab1b49dcd34ad23a8ddcce266b6658739bc0f5698dca4
                                                                                                        • Opcode Fuzzy Hash: e4b2ecfcfa893ff17553470f1835d2c21342bacfaf5c8ca03e615e843d4af16f
                                                                                                        • Instruction Fuzzy Hash: 61414C70A40208AFDF00EBA5DD42F9E7BB8EB08714F52457AF510F7291D7799E008B68
                                                                                                        APIs
                                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E51D,?,00000000,0047E6DC,00000000), ref: 0042E441
                                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E447
                                                                                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E51D,?,00000000,0047E6DC,00000000), ref: 0042E495
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressCloseHandleModuleProc
                                                                                                        • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$QaE$kernel32.dll
                                                                                                        • API String ID: 4190037839-2312295185
                                                                                                        • Opcode ID: 6084c433af3ee4d64f0cd9982e7ad42a34d4dd09e5920a5815d9b88696e74604
                                                                                                        • Instruction ID: f42d7e7755912f49377b3a3c2778cbb45b18f2cdc7334bb7b0fb93ca3fe573dd
                                                                                                        • Opcode Fuzzy Hash: 6084c433af3ee4d64f0cd9982e7ad42a34d4dd09e5920a5815d9b88696e74604
                                                                                                        • Instruction Fuzzy Hash: E8213230B10225BBDB10EAE6DC51B9E76B8EB44308F90447BA504E7281E77CDE419B5C
                                                                                                        APIs
                                                                                                        • GetActiveWindow.USER32 ref: 004629FC
                                                                                                        • GetModuleHandleA.KERNEL32(user32.dll), ref: 00462A10
                                                                                                        • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 00462A1D
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00462A2A
                                                                                                        • GetWindowRect.USER32(?,00000000), ref: 00462A76
                                                                                                        • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 00462AB4
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                                                        • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                                                        • API String ID: 2610873146-3407710046
                                                                                                        • Opcode ID: 49e394185691d1c2da29acdf0cb3719649ef4a9244e3d7219ece30713ed86938
                                                                                                        • Instruction ID: 865a179037155f8fdabe2954c964c2dd38b7d55406d5d1e7c7801a7b23b437f8
                                                                                                        • Opcode Fuzzy Hash: 49e394185691d1c2da29acdf0cb3719649ef4a9244e3d7219ece30713ed86938
                                                                                                        • Instruction Fuzzy Hash: B7219575701B057BD610D6A88D85F3B36D8EB84715F094A2AF944DB3C1E6F8EC018B9A
                                                                                                        APIs
                                                                                                        • GetActiveWindow.USER32 ref: 0042F194
                                                                                                        • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042F1A8
                                                                                                        • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042F1B5
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042F1C2
                                                                                                        • GetWindowRect.USER32(?,00000000), ref: 0042F20E
                                                                                                        • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042F24C
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                                                        • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                                                        • API String ID: 2610873146-3407710046
                                                                                                        • Opcode ID: d786bd72f778b9cca068a569f688e0802e61ee9ccadb1309323c976dabd5d685
                                                                                                        • Instruction ID: 50a2e38ba83faf67dd7c56e8d7733487d454ef14a416094e89dadcccf0bf0910
                                                                                                        • Opcode Fuzzy Hash: d786bd72f778b9cca068a569f688e0802e61ee9ccadb1309323c976dabd5d685
                                                                                                        • Instruction Fuzzy Hash: 3821F279704710ABD300EA68ED41F3B37A9DB89714F88457AF944DB382DA79EC044BA9
                                                                                                        APIs
                                                                                                        • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,00458DFB,?,00000000,00458E5E,?,?,02253858,00000000), ref: 00458C79
                                                                                                        • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02253858,?,00000000,00458D90,?,00000000,00000001,00000000,00000000,00000000,00458DFB), ref: 00458CD6
                                                                                                        • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02253858,?,00000000,00458D90,?,00000000,00000001,00000000,00000000,00000000,00458DFB), ref: 00458CE3
                                                                                                        • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00458D2F
                                                                                                        • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,00458D69,?,-00000020,0000000C,-00004034,00000014,02253858,?,00000000,00458D90,?,00000000), ref: 00458D55
                                                                                                        • GetLastError.KERNEL32(?,?,00000000,00000001,00458D69,?,-00000020,0000000C,-00004034,00000014,02253858,?,00000000,00458D90,?,00000000), ref: 00458D5C
                                                                                                          • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                                                                                                        • String ID: CreateEvent$TransactNamedPipe
                                                                                                        • API String ID: 2182916169-3012584893
                                                                                                        • Opcode ID: 7b509680db312d6d9eeee96a6ca75077f36d693cf911451bc7dd7bcd49c3517f
                                                                                                        • Instruction ID: 06b5d05a5e38ae799b2edb69ba26f0faef77b18cb4ad173b91f5c3c95d125767
                                                                                                        • Opcode Fuzzy Hash: 7b509680db312d6d9eeee96a6ca75077f36d693cf911451bc7dd7bcd49c3517f
                                                                                                        • Instruction Fuzzy Hash: EF418E75A00608AFDB15DF95C981F9EB7F8EB48714F1044AAF900F72D2DA789E44CA28
                                                                                                        APIs
                                                                                                        • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,00456E85,?,?,00000031,?), ref: 00456D48
                                                                                                        • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 00456D4E
                                                                                                        • LoadTypeLib.OLEAUT32(00000000,?), ref: 00456D9B
                                                                                                          • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressErrorHandleLastLoadModuleProcType
                                                                                                        • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                                                                                                        • API String ID: 1914119943-2711329623
                                                                                                        • Opcode ID: e2963ea3afedc97cdb575031c9274042e2bd1e61e6c3a56a36b999a051922bf2
                                                                                                        • Instruction ID: d1bb8c6bfccdc0522a96f5e3020b18907c52df716e7671809b7eaf465cfb4023
                                                                                                        • Opcode Fuzzy Hash: e2963ea3afedc97cdb575031c9274042e2bd1e61e6c3a56a36b999a051922bf2
                                                                                                        • Instruction Fuzzy Hash: 6831A375A00604AFDB41EFAACC12D5BB7BDEB8970675244A6FD04D3352DB38DD08CA28
                                                                                                        APIs
                                                                                                        • RectVisible.GDI32(?,?), ref: 00416E13
                                                                                                        • SaveDC.GDI32(?), ref: 00416E27
                                                                                                        • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00416E4A
                                                                                                        • RestoreDC.GDI32(?,?), ref: 00416E65
                                                                                                        • CreateSolidBrush.GDI32(00000000), ref: 00416EE5
                                                                                                        • FrameRect.USER32(?,?,?), ref: 00416F18
                                                                                                        • DeleteObject.GDI32(?), ref: 00416F22
                                                                                                        • CreateSolidBrush.GDI32(00000000), ref: 00416F32
                                                                                                        • FrameRect.USER32(?,?,?), ref: 00416F65
                                                                                                        • DeleteObject.GDI32(?), ref: 00416F6F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                                                                                        • String ID:
                                                                                                        • API String ID: 375863564-0
                                                                                                        • Opcode ID: c69605c35faac69eeef83e1ef2bcb629ef32bf90482d96ab6e01708da643fe70
                                                                                                        • Instruction ID: c082a38e55a2621cff38c0036c5e412d4739722926df34ebe37a7eff5f7859fc
                                                                                                        • Opcode Fuzzy Hash: c69605c35faac69eeef83e1ef2bcb629ef32bf90482d96ab6e01708da643fe70
                                                                                                        • Instruction Fuzzy Hash: 70515A712086459FDB50EF69C8C4B9B77E8AF48314F15466AFD488B286C738EC81CB99
                                                                                                        APIs
                                                                                                        • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
                                                                                                        • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
                                                                                                        • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
                                                                                                        • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
                                                                                                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
                                                                                                        • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
                                                                                                        • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
                                                                                                        • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
                                                                                                        • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
                                                                                                        • GetLastError.KERNEL32(000000F5), ref: 00404C46
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                                                        • String ID:
                                                                                                        • API String ID: 1694776339-0
                                                                                                        • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                                                        • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
                                                                                                        • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                                                        • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
                                                                                                        APIs
                                                                                                        • GetSystemMenu.USER32(00000000,00000000), ref: 00422233
                                                                                                        • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 00422251
                                                                                                        • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042225E
                                                                                                        • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042226B
                                                                                                        • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422278
                                                                                                        • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 00422285
                                                                                                        • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 00422292
                                                                                                        • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 0042229F
                                                                                                        • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 004222BD
                                                                                                        • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 004222D9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Menu$Delete$EnableItem$System
                                                                                                        • String ID:
                                                                                                        • API String ID: 3985193851-0
                                                                                                        • Opcode ID: 794ac4a4d1563d503d4e128f610caca5ba976f2c29ed192f4e654ec8c2abe850
                                                                                                        • Instruction ID: 662ae76830c3dbb110fd6952920e185112f137d20e740dc0dcce1beff7d7cd05
                                                                                                        • Opcode Fuzzy Hash: 794ac4a4d1563d503d4e128f610caca5ba976f2c29ed192f4e654ec8c2abe850
                                                                                                        • Instruction Fuzzy Hash: AF2144703407047AE720E724CD8BF9BBBD89B04708F5451A5BA487F6D3C6F9AB804698
                                                                                                        APIs
                                                                                                        • FreeLibrary.KERNEL32(10000000), ref: 00481A11
                                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 00481A25
                                                                                                        • SendNotifyMessageA.USER32(00020456,00000496,00002710,00000000), ref: 00481A97
                                                                                                        Strings
                                                                                                        • DeinitializeSetup, xrefs: 0048190D
                                                                                                        • Deinitializing Setup., xrefs: 00481872
                                                                                                        • Restarting Windows., xrefs: 00481A72
                                                                                                        • GetCustomSetupExitCode, xrefs: 004818B1
                                                                                                        • Not restarting Windows because Setup is being run from the debugger., xrefs: 00481A46
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FreeLibrary$MessageNotifySend
                                                                                                        • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                                                                                                        • API String ID: 3817813901-1884538726
                                                                                                        • Opcode ID: b2d1279a618dd00e76101f6ddb87be929459601488252b11527f6c6d16611b1a
                                                                                                        • Instruction ID: b122ee3e0244d1cffd13458a0655c780be2d4a3cdc4850abd58d30bc7702deed
                                                                                                        • Opcode Fuzzy Hash: b2d1279a618dd00e76101f6ddb87be929459601488252b11527f6c6d16611b1a
                                                                                                        • Instruction Fuzzy Hash: C651BF347042409FD715EB69E9A5B6E7BE8EB19314F10887BE800C72B2DB389C46CB5D
                                                                                                        APIs
                                                                                                        • SHGetMalloc.SHELL32(?), ref: 004616C7
                                                                                                        • GetActiveWindow.USER32 ref: 0046172B
                                                                                                        • CoInitialize.OLE32(00000000), ref: 0046173F
                                                                                                        • SHBrowseForFolder.SHELL32(?), ref: 00461756
                                                                                                        • CoUninitialize.OLE32(00461797,00000000,?,?,?,?,?,00000000,0046181B), ref: 0046176B
                                                                                                        • SetActiveWindow.USER32(?,00461797,00000000,?,?,?,?,?,00000000,0046181B), ref: 00461781
                                                                                                        • SetActiveWindow.USER32(?,?,00461797,00000000,?,?,?,?,?,00000000,0046181B), ref: 0046178A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ActiveWindow$BrowseFolderInitializeMallocUninitialize
                                                                                                        • String ID: A
                                                                                                        • API String ID: 2684663990-3554254475
                                                                                                        • Opcode ID: cb3d39f68a826354347aa7a8a61ff080deb010c50648a66159b3978de9eda5bc
                                                                                                        • Instruction ID: 0f37cca2ee7d5c89cd5c8fe3b5c5f67eac08b275376d6c087401a1ac056189be
                                                                                                        • Opcode Fuzzy Hash: cb3d39f68a826354347aa7a8a61ff080deb010c50648a66159b3978de9eda5bc
                                                                                                        • Instruction Fuzzy Hash: C3312F70E00348AFDB10EFA6D885A9EBBF8EB09304F55847AF404E7251E7785A048F59
                                                                                                        APIs
                                                                                                        • GetFileAttributesA.KERNEL32(00000000,00000000,00472AB9,?,?,?,00000008,00000000,00000000,00000000,?,00472D15,?,?,00000000,00472F84), ref: 00472A1C
                                                                                                          • Part of subcall function 0042CD94: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0042CE0A
                                                                                                          • Part of subcall function 00406F50: DeleteFileA.KERNEL32(00000000,0049B628,004986F1,00000000,00498746,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F5B
                                                                                                        • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00472AB9,?,?,?,00000008,00000000,00000000,00000000,?,00472D15), ref: 00472A93
                                                                                                        • RemoveDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00472AB9,?,?,?,00000008,00000000,00000000,00000000), ref: 00472A99
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: File$Attributes$DeleteDirectoryPrivateProfileRemoveString
                                                                                                        • String ID: .ShellClassInfo$CLSID2$desktop.ini$target.lnk${0AFACED1-E828-11D1-9187-B532F1E9575D}
                                                                                                        • API String ID: 884541143-1710247218
                                                                                                        • Opcode ID: c45dacd24f7b5bc8c90ad3d0814151273abff7c22a7deb77a2667df06dffab17
                                                                                                        • Instruction ID: 1765d5ebfc4e6887f49e3816ac39c9d5a3c16910e93b0aec031ce55b1572895b
                                                                                                        • Opcode Fuzzy Hash: c45dacd24f7b5bc8c90ad3d0814151273abff7c22a7deb77a2667df06dffab17
                                                                                                        • Instruction Fuzzy Hash: 6711B2707005147BD721EAAA8D82B9F73ACDB49714F61C17BB404B72C2DBBCAE01861C
                                                                                                        APIs
                                                                                                        • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,00401B68), ref: 00401ABD
                                                                                                        • LocalFree.KERNEL32(005EED28,00000000,00401B68), ref: 00401ACF
                                                                                                        • VirtualFree.KERNEL32(?,00000000,00008000,005EED28,00000000,00401B68), ref: 00401AEE
                                                                                                        • LocalFree.KERNEL32(005E23C8,?,00000000,00008000,005EED28,00000000,00401B68), ref: 00401B2D
                                                                                                        • RtlLeaveCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B58
                                                                                                        • RtlDeleteCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B62
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                                                        • String ID: (^$)^
                                                                                                        • API String ID: 3782394904-1313738987
                                                                                                        • Opcode ID: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                                                                                                        • Instruction ID: 79795942c165c44483fb09e1962e32eaca51f8de38df00e9c029d8aa05623ce8
                                                                                                        • Opcode Fuzzy Hash: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                                                                                                        • Instruction Fuzzy Hash: 3B118E30A003405AEB15AB65BE85B263BA5D761B08F44407BF80067BF3D77C5850E7AE
                                                                                                        APIs
                                                                                                        • GetProcAddress.KERNEL32(00000000,inflateInit_), ref: 0045D2BD
                                                                                                        • GetProcAddress.KERNEL32(00000000,inflate), ref: 0045D2CD
                                                                                                        • GetProcAddress.KERNEL32(00000000,inflateEnd), ref: 0045D2DD
                                                                                                        • GetProcAddress.KERNEL32(00000000,inflateReset), ref: 0045D2ED
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc
                                                                                                        • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                                                                                                        • API String ID: 190572456-3516654456
                                                                                                        • Opcode ID: 5039b32c95ab4f878aa340bc95ef1656196d0563f790867e571847c0b893819f
                                                                                                        • Instruction ID: d913f85fec6517a53d2ec7ba369195fd603025f4bffd93910817278a70f0814a
                                                                                                        • Opcode Fuzzy Hash: 5039b32c95ab4f878aa340bc95ef1656196d0563f790867e571847c0b893819f
                                                                                                        • Instruction Fuzzy Hash: C20112B0D00701DBE724DFF6ACC672636A5ABA8306F14C03B9D09962A2D77D0459DF2E
                                                                                                        APIs
                                                                                                        • SetBkColor.GDI32(?,00000000), ref: 0041A9B9
                                                                                                        • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 0041A9F3
                                                                                                        • SetBkColor.GDI32(?,?), ref: 0041AA08
                                                                                                        • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041AA52
                                                                                                        • SetTextColor.GDI32(00000000,00000000), ref: 0041AA5D
                                                                                                        • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041AA6D
                                                                                                        • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AAAC
                                                                                                        • SetTextColor.GDI32(00000000,00000000), ref: 0041AAB6
                                                                                                        • SetBkColor.GDI32(00000000,?), ref: 0041AAC3
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Color$StretchText
                                                                                                        • String ID:
                                                                                                        • API String ID: 2984075790-0
                                                                                                        • Opcode ID: c2c61a06e11fc6ac6c72d0136d8e20986a2ab5507b690e8d84a304c9a27ba9fd
                                                                                                        • Instruction ID: 4467ea82dd13d464879b0bd0dd0607b47ee3045dce17e21d2c6451b7f26a8ea4
                                                                                                        • Opcode Fuzzy Hash: c2c61a06e11fc6ac6c72d0136d8e20986a2ab5507b690e8d84a304c9a27ba9fd
                                                                                                        • Instruction Fuzzy Hash: 8761E5B5A00505AFCB40EFADD985E9AB7F8EF08314B10816AF908DB262C775ED40CF58
                                                                                                        APIs
                                                                                                          • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                                                                        • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00458278,?, /s ",?,regsvr32.exe",?,00458278), ref: 004581EA
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseDirectoryHandleSystem
                                                                                                        • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
                                                                                                        • API String ID: 2051275411-1862435767
                                                                                                        • Opcode ID: 4002d2de1ab03b38d977d670fcb0d45de6735b09ab9cf6adf03ef289ce7e4165
                                                                                                        • Instruction ID: cda81b302c56d3c3b7af3d8ffa4af26d40175ae7a7c1cff7e24eee752c39b11a
                                                                                                        • Opcode Fuzzy Hash: 4002d2de1ab03b38d977d670fcb0d45de6735b09ab9cf6adf03ef289ce7e4165
                                                                                                        • Instruction Fuzzy Hash: 21411670A047486BDB10EFD6D842B8DBBF9AF45305F50407FB904BB292DF789A098B19
                                                                                                        APIs
                                                                                                        • OffsetRect.USER32(?,00000001,00000001), ref: 0044D1A9
                                                                                                        • GetSysColor.USER32(00000014), ref: 0044D1B0
                                                                                                        • SetTextColor.GDI32(00000000,00000000), ref: 0044D1C8
                                                                                                        • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D1F1
                                                                                                        • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044D1FB
                                                                                                        • GetSysColor.USER32(00000010), ref: 0044D202
                                                                                                        • SetTextColor.GDI32(00000000,00000000), ref: 0044D21A
                                                                                                        • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D243
                                                                                                        • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D26E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Text$Color$Draw$OffsetRect
                                                                                                        • String ID:
                                                                                                        • API String ID: 1005981011-0
                                                                                                        • Opcode ID: 32856f07fc45aa5b94f1f38070a47e962b22e9d58654105098b1be26c78061dc
                                                                                                        • Instruction ID: 8406a00effd73db105afccad7da3796984cf264811f0ddac3e5cace4e0ac1d2b
                                                                                                        • Opcode Fuzzy Hash: 32856f07fc45aa5b94f1f38070a47e962b22e9d58654105098b1be26c78061dc
                                                                                                        • Instruction Fuzzy Hash: A021BDB42015047FC710FB2ACD8AE8B6BDCDF19319B05457AB958EB292C67CDD404668
                                                                                                        APIs
                                                                                                        • GetFocus.USER32 ref: 0041B745
                                                                                                        • GetDC.USER32(?), ref: 0041B751
                                                                                                        • SelectPalette.GDI32(00000000,?,00000000), ref: 0041B786
                                                                                                        • RealizePalette.GDI32(00000000), ref: 0041B792
                                                                                                        • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041B7C0
                                                                                                        • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041B7F4
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Palette$Select$BitmapCreateFocusRealize
                                                                                                        • String ID: %H
                                                                                                        • API String ID: 3275473261-1959103961
                                                                                                        • Opcode ID: 9b17a45ebd00e155e5aeae17ac6cac102e8e00fd56b9a0d3692e3d2bf0971335
                                                                                                        • Instruction ID: 38bdddf8d72f5571b31e8017bfcff87152bbfcb95d4f6cd7f9962c0a723fddb9
                                                                                                        • Opcode Fuzzy Hash: 9b17a45ebd00e155e5aeae17ac6cac102e8e00fd56b9a0d3692e3d2bf0971335
                                                                                                        • Instruction Fuzzy Hash: 8A512F70A002099FDF11DFA9C881AEEBBF9FF49704F104066F504A7791D7799981CBA9
                                                                                                        APIs
                                                                                                        • GetFocus.USER32 ref: 0041BA17
                                                                                                        • GetDC.USER32(?), ref: 0041BA23
                                                                                                        • SelectPalette.GDI32(00000000,?,00000000), ref: 0041BA5D
                                                                                                        • RealizePalette.GDI32(00000000), ref: 0041BA69
                                                                                                        • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BA8D
                                                                                                        • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041BAC1
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Palette$Select$BitmapCreateFocusRealize
                                                                                                        • String ID: %H
                                                                                                        • API String ID: 3275473261-1959103961
                                                                                                        • Opcode ID: f1b656a7ede54f8d65f93cc35dc493626dae048aef23b352968a277fb398f08e
                                                                                                        • Instruction ID: 3fcaffe560058c7771eaec6053d79e0e1924f360d52694d27862de55114c0f48
                                                                                                        • Opcode Fuzzy Hash: f1b656a7ede54f8d65f93cc35dc493626dae048aef23b352968a277fb398f08e
                                                                                                        • Instruction Fuzzy Hash: 9D512A74A002189FDB11DFA9C891AAEBBF9FF49700F154066F904EB751D738AD40CBA4
                                                                                                        APIs
                                                                                                          • Part of subcall function 0045092C: SetEndOfFile.KERNEL32(?,?,0045C342,00000000,0045C4CD,?,00000000,00000002,00000002), ref: 00450933
                                                                                                          • Part of subcall function 00406F50: DeleteFileA.KERNEL32(00000000,0049B628,004986F1,00000000,00498746,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F5B
                                                                                                        • GetWindowThreadProcessId.USER32(00000000,?), ref: 00496585
                                                                                                        • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 00496599
                                                                                                        • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 004965B3
                                                                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 004965BF
                                                                                                        • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 004965C5
                                                                                                        • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 004965D8
                                                                                                        Strings
                                                                                                        • Deleting Uninstall data files., xrefs: 004964FB
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FileProcess$CloseDeleteHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
                                                                                                        • String ID: Deleting Uninstall data files.
                                                                                                        • API String ID: 1570157960-2568741658
                                                                                                        • Opcode ID: 8e8cb50e53c2c3b2038bacabf8c777ac21aad5dfe2dc8a8db11d37eec289bdf4
                                                                                                        • Instruction ID: caddedc05ae4add9971b90b84c259ce0cd5246952d50e779d54ebc968ffbf915
                                                                                                        • Opcode Fuzzy Hash: 8e8cb50e53c2c3b2038bacabf8c777ac21aad5dfe2dc8a8db11d37eec289bdf4
                                                                                                        • Instruction Fuzzy Hash: 73216170204250BFEB10EB6ABC82B2637A8DB54728F53453BB501961D6DA7CAC448A6D
                                                                                                        APIs
                                                                                                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                                        • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004702F9,?,?,?,?,00000000), ref: 00470263
                                                                                                        • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004702F9), ref: 0047027A
                                                                                                        • AddFontResourceA.GDI32(00000000), ref: 00470297
                                                                                                        • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 004702AB
                                                                                                        Strings
                                                                                                        • Failed to open Fonts registry key., xrefs: 00470281
                                                                                                        • AddFontResource, xrefs: 004702B5
                                                                                                        • Failed to set value in Fonts registry key., xrefs: 0047026C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseFontMessageNotifyOpenResourceSendValue
                                                                                                        • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                                                                                                        • API String ID: 955540645-649663873
                                                                                                        • Opcode ID: f6cb4db48621d05014dac95341ab5faf08594db0be4636be460d29a68d9f0f75
                                                                                                        • Instruction ID: 122e39bb1ea2b43e4c2a7da55aa69ddad999e5e54c07bca5f4119535fc7344d3
                                                                                                        • Opcode Fuzzy Hash: f6cb4db48621d05014dac95341ab5faf08594db0be4636be460d29a68d9f0f75
                                                                                                        • Instruction Fuzzy Hash: 6921E271741204BBDB10EAA68C46FAE67AC9B14704F208477B904EB3C3DA7C9E01866D
                                                                                                        APIs
                                                                                                          • Part of subcall function 00416410: GetClassInfoA.USER32(00400000,?,?), ref: 0041647F
                                                                                                          • Part of subcall function 00416410: UnregisterClassA.USER32(?,00400000), ref: 004164AB
                                                                                                          • Part of subcall function 00416410: RegisterClassA.USER32(?), ref: 004164CE
                                                                                                        • GetVersion.KERNEL32 ref: 00462E60
                                                                                                        • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 00462E9E
                                                                                                        • SHGetFileInfo.SHELL32(00462F3C,00000000,?,00000160,00004011), ref: 00462EBB
                                                                                                        • LoadCursorA.USER32(00000000,00007F02), ref: 00462ED9
                                                                                                        • SetCursor.USER32(00000000,00000000,00007F02,00462F3C,00000000,?,00000160,00004011), ref: 00462EDF
                                                                                                        • SetCursor.USER32(?,00462F1F,00007F02,00462F3C,00000000,?,00000160,00004011), ref: 00462F12
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
                                                                                                        • String ID: Explorer
                                                                                                        • API String ID: 2594429197-512347832
                                                                                                        • Opcode ID: 271d5cc6534746d744017855cbe3809792a4a5bc456b5a0a77df68c724b1ffee
                                                                                                        • Instruction ID: b0f6820fd5a5ea072646c086af9eca81c98a3cd1ffd9b7ca0f87214cf94a4ba1
                                                                                                        • Opcode Fuzzy Hash: 271d5cc6534746d744017855cbe3809792a4a5bc456b5a0a77df68c724b1ffee
                                                                                                        • Instruction Fuzzy Hash: CD21E7307403047AEB15BB759D47B9A3798DB09708F4004BFFA05EA1C3EEBD9901966D
                                                                                                        APIs
                                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02252BDC,?,?,?,02252BDC,00478534,00000000,00478652,?,?,-00000010,?), ref: 00478389
                                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0047838F
                                                                                                        • GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02252BDC,?,?,?,02252BDC,00478534,00000000,00478652,?,?,-00000010,?), ref: 004783A2
                                                                                                        • CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02252BDC,?,?,?,02252BDC), ref: 004783CC
                                                                                                        • CloseHandle.KERNEL32(00000000,?,?,?,02252BDC,00478534,00000000,00478652,?,?,-00000010,?), ref: 004783EA
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FileHandle$AddressAttributesCloseCreateModuleProc
                                                                                                        • String ID: GetFinalPathNameByHandleA$kernel32.dll
                                                                                                        • API String ID: 2704155762-2318956294
                                                                                                        • Opcode ID: 606546fc07dcf4a3bd117f62e36919ba8c62e6b487fb6962041f4ee6dba1ecda
                                                                                                        • Instruction ID: 2a72e966618face2f1bd82d2a524167157479a72732682c44667b4342ad9b4bf
                                                                                                        • Opcode Fuzzy Hash: 606546fc07dcf4a3bd117f62e36919ba8c62e6b487fb6962041f4ee6dba1ecda
                                                                                                        • Instruction Fuzzy Hash: 370180A07C070536E520316A4C8AFBB654C8B50769F14863FBA1DFA2D3FDED9D06016E
                                                                                                        APIs
                                                                                                        • GetLastError.KERNEL32(00000000,00459F8E,?,00000000,00000000,00000000,?,00000006,?,00000000,0049785D,?,00000000,00497900), ref: 00459ED2
                                                                                                          • Part of subcall function 004543F4: FindClose.KERNEL32(000000FF,004544EA), ref: 004544D9
                                                                                                        Strings
                                                                                                        • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 00459EAC
                                                                                                        • Failed to delete directory (%d)., xrefs: 00459F68
                                                                                                        • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 00459F47
                                                                                                        • Stripped read-only attribute., xrefs: 00459E94
                                                                                                        • Failed to strip read-only attribute., xrefs: 00459EA0
                                                                                                        • Failed to delete directory (%d). Will retry later., xrefs: 00459EEB
                                                                                                        • Deleting directory: %s, xrefs: 00459E5B
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseErrorFindLast
                                                                                                        • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                                                                                                        • API String ID: 754982922-1448842058
                                                                                                        • Opcode ID: 9c44e2e7f6fe757755561f6ca8568e0fef47b87f075e017b2858cb20ebfba709
                                                                                                        • Instruction ID: b8d9b7298ea7c3337bda5d500217c07e27fbd6b384233f4239b27a523d6d10d0
                                                                                                        • Opcode Fuzzy Hash: 9c44e2e7f6fe757755561f6ca8568e0fef47b87f075e017b2858cb20ebfba709
                                                                                                        • Instruction Fuzzy Hash: 1841A331A04208CACB10EB69C8413AEB6A55F4530AF54897BAC01D73D3CB7C8E0DC75E
                                                                                                        APIs
                                                                                                        • GetCapture.USER32 ref: 00422EA4
                                                                                                        • GetCapture.USER32 ref: 00422EB3
                                                                                                        • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422EB9
                                                                                                        • ReleaseCapture.USER32 ref: 00422EBE
                                                                                                        • GetActiveWindow.USER32 ref: 00422ECD
                                                                                                        • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00422F4C
                                                                                                        • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00422FB0
                                                                                                        • GetActiveWindow.USER32 ref: 00422FBF
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CaptureMessageSend$ActiveWindow$Release
                                                                                                        • String ID:
                                                                                                        • API String ID: 862346643-0
                                                                                                        • Opcode ID: b1a57ae8c862de22bc82aa702dd5f84040ee9f6a0804fcde46ad074f7f3e30fe
                                                                                                        • Instruction ID: c6261992695b47722d84ffa44129b55dc5b2a4dad2f70b0012283783c1c7b094
                                                                                                        • Opcode Fuzzy Hash: b1a57ae8c862de22bc82aa702dd5f84040ee9f6a0804fcde46ad074f7f3e30fe
                                                                                                        • Instruction Fuzzy Hash: 24417230B00245AFDB10EB69DA86B9E77F1EF44304F5540BAF404AB2A2D778AE40DB49
                                                                                                        APIs
                                                                                                        • GetWindowLongA.USER32(?,000000F0), ref: 0042F2BA
                                                                                                        • GetWindowLongA.USER32(?,000000EC), ref: 0042F2D1
                                                                                                        • GetActiveWindow.USER32 ref: 0042F2DA
                                                                                                        • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 0042F307
                                                                                                        • SetActiveWindow.USER32(?,0042F437,00000000,?), ref: 0042F328
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Window$ActiveLong$Message
                                                                                                        • String ID:
                                                                                                        • API String ID: 2785966331-0
                                                                                                        • Opcode ID: 267c9eefe26e23fd4e765c6349420bb8bb9da3d18075eb1d96a464b655a4fe2f
                                                                                                        • Instruction ID: ac844ef734d24c76dc9aa96f201b13a865b129e9c1b137beabd8cb6517960092
                                                                                                        • Opcode Fuzzy Hash: 267c9eefe26e23fd4e765c6349420bb8bb9da3d18075eb1d96a464b655a4fe2f
                                                                                                        • Instruction Fuzzy Hash: F931D271A00254AFEB01EFA5DD52E6EBBB8EB09304F9144BAF804E3291D73C9D10CB58
                                                                                                        APIs
                                                                                                        • GetDC.USER32(00000000), ref: 0042948A
                                                                                                        • GetTextMetricsA.GDI32(00000000), ref: 00429493
                                                                                                          • Part of subcall function 0041A1E8: CreateFontIndirectA.GDI32(?), ref: 0041A2A7
                                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 004294A2
                                                                                                        • GetTextMetricsA.GDI32(00000000,?), ref: 004294AF
                                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 004294B6
                                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 004294BE
                                                                                                        • GetSystemMetrics.USER32(00000006), ref: 004294E3
                                                                                                        • GetSystemMetrics.USER32(00000006), ref: 004294FD
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Metrics$ObjectSelectSystemText$CreateFontIndirectRelease
                                                                                                        • String ID:
                                                                                                        • API String ID: 1583807278-0
                                                                                                        • Opcode ID: 960ca5b6b9ec06081429caf0e2ae16fd4423d047ce8cb1d090ce01a2b2c84894
                                                                                                        • Instruction ID: 8a5b62ad3b2811282b00f4aa11bc4c2c065e9b9ae855548013837f5c18493421
                                                                                                        • Opcode Fuzzy Hash: 960ca5b6b9ec06081429caf0e2ae16fd4423d047ce8cb1d090ce01a2b2c84894
                                                                                                        • Instruction Fuzzy Hash: 0F01C4A17087103BE321767A9CC6F6F65C8DB44358F84043BF686D63D3D96C9C41866A
                                                                                                        APIs
                                                                                                        • GetDC.USER32(00000000), ref: 0041DE27
                                                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041DE31
                                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 0041DE3E
                                                                                                        • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041DE4D
                                                                                                        • GetStockObject.GDI32(00000007), ref: 0041DE5B
                                                                                                        • GetStockObject.GDI32(00000005), ref: 0041DE67
                                                                                                        • GetStockObject.GDI32(0000000D), ref: 0041DE73
                                                                                                        • LoadIconA.USER32(00000000,00007F00), ref: 0041DE84
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ObjectStock$CapsDeviceIconLoadRelease
                                                                                                        • String ID:
                                                                                                        • API String ID: 225703358-0
                                                                                                        • Opcode ID: cf3de45f10179e040e4bf754cd3e00afbbff0486b0448c288d4be5e1939ebdb6
                                                                                                        • Instruction ID: 282f56568f1177e4dad385ec7f61a974d29090d827cf1f87eb40c920fa9ca7e8
                                                                                                        • Opcode Fuzzy Hash: cf3de45f10179e040e4bf754cd3e00afbbff0486b0448c288d4be5e1939ebdb6
                                                                                                        • Instruction Fuzzy Hash: 4C1142706457015EE340BFA66E52B6A36A4D725708F40413FF609AF3D1D77A2C448B9E
                                                                                                        APIs
                                                                                                        • LoadCursorA.USER32(00000000,00007F02), ref: 00463344
                                                                                                        • SetCursor.USER32(00000000,00000000,00007F02,00000000,004633D9), ref: 0046334A
                                                                                                        • SetCursor.USER32(?,004633C1,00007F02,00000000,004633D9), ref: 004633B4
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Cursor$Load
                                                                                                        • String ID: $ $Internal error: Item already expanding
                                                                                                        • API String ID: 1675784387-1948079669
                                                                                                        • Opcode ID: 040729a671edf880b94918ceea5f8eaec20fdfbf8da854279a56862745118dff
                                                                                                        • Instruction ID: e4e85f4aa3fa623d7d3a169fbc538aa22306e9421cedfdc69a3031d12d347dae
                                                                                                        • Opcode Fuzzy Hash: 040729a671edf880b94918ceea5f8eaec20fdfbf8da854279a56862745118dff
                                                                                                        • Instruction Fuzzy Hash: 4CB18270604284EFDB11DF29C545B9ABBF1BF04305F1484AAE8469B792DB78EE44CB4A
                                                                                                        APIs
                                                                                                        • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E17
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: PrivateProfileStringWrite
                                                                                                        • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]
                                                                                                        • API String ID: 390214022-3304407042
                                                                                                        • Opcode ID: 262666494607197906d7283235c4c76affd32b2b0fdb9ef9cba9b9ea75353bac
                                                                                                        • Instruction ID: 4c4b1d7f09994941c57eaafc4db68242d6a3f6c21ecd3f2b5b8f846a746055a2
                                                                                                        • Opcode Fuzzy Hash: 262666494607197906d7283235c4c76affd32b2b0fdb9ef9cba9b9ea75353bac
                                                                                                        • Instruction Fuzzy Hash: 40911434E002099BDB01EFA5D842BDEB7F5AF4874AF608466E90077392D7786E49CB58
                                                                                                        APIs
                                                                                                        • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 00476CA9
                                                                                                        • SetWindowLongW.USER32(00000000,000000FC,00476C04), ref: 00476CD0
                                                                                                        • GetACP.KERNEL32(00000000,00476EE8,?,00000000,00476F12), ref: 00476D0D
                                                                                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00476D53
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ClassInfoLongMessageSendWindow
                                                                                                        • String ID: COMBOBOX$Inno Setup: Language
                                                                                                        • API String ID: 3391662889-4234151509
                                                                                                        • Opcode ID: 1db359e320ab2741222256d54ad499686456584f5ec697b8868a090b3fdd66eb
                                                                                                        • Instruction ID: b13fa11fcbd9abdf7db93726dac51e4442bd67f198c8610d2c1064f44be53319
                                                                                                        • Opcode Fuzzy Hash: 1db359e320ab2741222256d54ad499686456584f5ec697b8868a090b3fdd66eb
                                                                                                        • Instruction Fuzzy Hash: 46812C346006059FDB10DF69D985AEAB7F2FB09304F15C1BAE808EB762D778AD41CB58
                                                                                                        APIs
                                                                                                        • GetSystemDefaultLCID.KERNEL32(00000000,00408968,?,?,?,?,00000000,00000000,00000000,?,0040996F,00000000,00409982), ref: 0040873A
                                                                                                          • Part of subcall function 00408568: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,00408633,?,00000000,00408712), ref: 00408586
                                                                                                          • Part of subcall function 004085B4: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004087B6,?,?,?,00000000,00408968), ref: 004085C7
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InfoLocale$DefaultSystem
                                                                                                        • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                                                        • API String ID: 1044490935-665933166
                                                                                                        • Opcode ID: 99a58aab46255149f4b24f4520dbd6929c7443738739b227c4cc8c7d24f61a81
                                                                                                        • Instruction ID: 5c6fde8006682913ecab3173e7335377554a92ac61a87523d81808753b4ec1a9
                                                                                                        • Opcode Fuzzy Hash: 99a58aab46255149f4b24f4520dbd6929c7443738739b227c4cc8c7d24f61a81
                                                                                                        • Instruction Fuzzy Hash: 7D516C24B00108ABDB01FBA69E4169EB7A9DB94308F50C07FA181BB3C3CE3DDA05975D
                                                                                                        APIs
                                                                                                        • GetVersion.KERNEL32(00000000,004118F9), ref: 0041178C
                                                                                                        • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 0041184A
                                                                                                          • Part of subcall function 00411AAC: CreatePopupMenu.USER32 ref: 00411AC6
                                                                                                        • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 004118D6
                                                                                                          • Part of subcall function 00411AAC: CreateMenu.USER32 ref: 00411AD0
                                                                                                        • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 004118BD
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Menu$Insert$Create$ItemPopupVersion
                                                                                                        • String ID: ,$?
                                                                                                        • API String ID: 2359071979-2308483597
                                                                                                        • Opcode ID: 4986dcd06abefbee5f666d79fc26290c702fe8a84b14e195092edf3558bd7871
                                                                                                        • Instruction ID: ecf66c9774bccec907b621c371347452b74b7622051e058d8a4a73451c3e974f
                                                                                                        • Opcode Fuzzy Hash: 4986dcd06abefbee5f666d79fc26290c702fe8a84b14e195092edf3558bd7871
                                                                                                        • Instruction Fuzzy Hash: D7510674A00245ABDB10EF6ADC816EA7BF9AF09304B11857BF904E73A6D738DD41CB58
                                                                                                        APIs
                                                                                                        • GetObjectA.GDI32(?,00000018,?), ref: 0041BF28
                                                                                                        • GetObjectA.GDI32(?,00000018,?), ref: 0041BF37
                                                                                                        • GetBitmapBits.GDI32(?,?,?), ref: 0041BF88
                                                                                                        • GetBitmapBits.GDI32(?,?,?), ref: 0041BF96
                                                                                                        • DeleteObject.GDI32(?), ref: 0041BF9F
                                                                                                        • DeleteObject.GDI32(?), ref: 0041BFA8
                                                                                                        • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041BFC5
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Object$BitmapBitsDelete$CreateIcon
                                                                                                        • String ID:
                                                                                                        • API String ID: 1030595962-0
                                                                                                        • Opcode ID: dabea464bc85c36b4411cc83672e19ff5768c85fc4c65aec36842f1966395034
                                                                                                        • Instruction ID: 74cae3b7aa7aab4ce12a2fbd062d204c5c4082198076ec6df892ad84fd278e80
                                                                                                        • Opcode Fuzzy Hash: dabea464bc85c36b4411cc83672e19ff5768c85fc4c65aec36842f1966395034
                                                                                                        • Instruction Fuzzy Hash: 6A510671A002199FCB10DFA9C9819EEB7F9EF48314B11416AF914E7395D738AD41CB68
                                                                                                        APIs
                                                                                                        • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041CEFE
                                                                                                        • GetDeviceCaps.GDI32(00000000,00000026), ref: 0041CF1D
                                                                                                        • SelectPalette.GDI32(?,?,00000001), ref: 0041CF83
                                                                                                        • RealizePalette.GDI32(?), ref: 0041CF92
                                                                                                        • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041CFFC
                                                                                                        • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041D03A
                                                                                                        • SelectPalette.GDI32(?,?,00000001), ref: 0041D05F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: PaletteStretch$Select$BitsCapsDeviceModeRealize
                                                                                                        • String ID:
                                                                                                        • API String ID: 2222416421-0
                                                                                                        • Opcode ID: 5be0e4e6833feb243a8d388dd1011de92277052336d3d318ec39d49e9b6efc72
                                                                                                        • Instruction ID: 4b814cf558339e083a7fb5ccd56fb4ffad9fd0a27a4bfdacf16c2dd2476febac
                                                                                                        • Opcode Fuzzy Hash: 5be0e4e6833feb243a8d388dd1011de92277052336d3d318ec39d49e9b6efc72
                                                                                                        • Instruction Fuzzy Hash: D2515EB0604200AFDB14DFA8C985F9BBBE9EF08304F10459AB549DB292C778ED81CB58
                                                                                                        APIs
                                                                                                        • SendMessageA.USER32(00000000,?,?), ref: 0045732E
                                                                                                          • Part of subcall function 0042427C: GetWindowTextA.USER32(?,?,00000100), ref: 0042429C
                                                                                                          • Part of subcall function 0041EEA4: GetCurrentThreadId.KERNEL32 ref: 0041EEF3
                                                                                                          • Part of subcall function 0041EEA4: EnumThreadWindows.USER32(00000000,0041EE54,00000000), ref: 0041EEF9
                                                                                                          • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
                                                                                                        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00457395
                                                                                                        • TranslateMessage.USER32(?), ref: 004573B3
                                                                                                        • DispatchMessageA.USER32(?), ref: 004573BC
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Message$TextThreadWindow$CurrentDispatchEnumSendTranslateWindows
                                                                                                        • String ID: [Paused]
                                                                                                        • API String ID: 1007367021-4230553315
                                                                                                        • Opcode ID: 138259db96aaba9c66cb09bcf6582550d327018b684ee04c4d651f5f89e9d65e
                                                                                                        • Instruction ID: a72840e20965590be0df7748d4dcd1bfe023db3bc5775872eefead19b10ec59e
                                                                                                        • Opcode Fuzzy Hash: 138259db96aaba9c66cb09bcf6582550d327018b684ee04c4d651f5f89e9d65e
                                                                                                        • Instruction Fuzzy Hash: 633175319082449ADB11DBB9EC81B9E7FB8EF49314F5540B7EC00E7292D73C9909DB69
                                                                                                        APIs
                                                                                                        • GetCursor.USER32(00000000,0046B55F), ref: 0046B4DC
                                                                                                        • LoadCursorA.USER32(00000000,00007F02), ref: 0046B4EA
                                                                                                        • SetCursor.USER32(00000000,00000000,00007F02,00000000,0046B55F), ref: 0046B4F0
                                                                                                        • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,0046B55F), ref: 0046B4FA
                                                                                                        • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,0046B55F), ref: 0046B500
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Cursor$LoadSleep
                                                                                                        • String ID: CheckPassword
                                                                                                        • API String ID: 4023313301-1302249611
                                                                                                        • Opcode ID: 301d54e166a0b4011b0937e4b70ed1e1b4ade500f65d2603abaf2adc357acc1d
                                                                                                        • Instruction ID: 9465d4cba05e43c3341d6d018928b45656d3fee3f016636846a90655da25d4f4
                                                                                                        • Opcode Fuzzy Hash: 301d54e166a0b4011b0937e4b70ed1e1b4ade500f65d2603abaf2adc357acc1d
                                                                                                        • Instruction Fuzzy Hash: D0316334740204AFD711EF69C899B9A7BE4EF45308F5580B6F9049B3A2D7789E40CB99
                                                                                                        APIs
                                                                                                          • Part of subcall function 00477B94: GetWindowThreadProcessId.USER32(00000000), ref: 00477B9C
                                                                                                          • Part of subcall function 00477B94: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477C93,0049C0A8,00000000), ref: 00477BAF
                                                                                                          • Part of subcall function 00477B94: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477BB5
                                                                                                        • SendMessageA.USER32(00000000,0000004A,00000000,00478026), ref: 00477CA1
                                                                                                        • GetTickCount.KERNEL32 ref: 00477CE6
                                                                                                        • GetTickCount.KERNEL32 ref: 00477CF0
                                                                                                        • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 00477D45
                                                                                                        Strings
                                                                                                        • CallSpawnServer: Unexpected status: %d, xrefs: 00477D2E
                                                                                                        • CallSpawnServer: Unexpected response: $%x, xrefs: 00477CD6
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CountTick$AddressHandleMessageModuleMultipleObjectsProcProcessSendThreadWaitWindow
                                                                                                        • String ID: CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d
                                                                                                        • API String ID: 613034392-3771334282
                                                                                                        • Opcode ID: a349fc6668a2a279a7709dc0d92d626649643492524c5ed72309cd5f58a9f2ee
                                                                                                        • Instruction ID: 262cbc5b9954910938d5a1e8e32dc50db46ad6f301169d9d39307b56b522dac3
                                                                                                        • Opcode Fuzzy Hash: a349fc6668a2a279a7709dc0d92d626649643492524c5ed72309cd5f58a9f2ee
                                                                                                        • Instruction Fuzzy Hash: 87318474B042159EDB10EBB9C8867EE76A0AF08714F90807AB548EB392D67C9D4187AD
                                                                                                        APIs
                                                                                                        • GetProcAddress.KERNEL32(626D6573,CreateAssemblyCache), ref: 0045983F
                                                                                                        Strings
                                                                                                        • CreateAssemblyCache, xrefs: 00459836
                                                                                                        • .NET Framework CreateAssemblyCache function failed, xrefs: 00459862
                                                                                                        • Failed to get address of .NET Framework CreateAssemblyCache function, xrefs: 0045984A
                                                                                                        • Failed to load .NET Framework DLL "%s", xrefs: 00459824
                                                                                                        • Fusion.dll, xrefs: 004597DF
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc
                                                                                                        • String ID: .NET Framework CreateAssemblyCache function failed$CreateAssemblyCache$Failed to get address of .NET Framework CreateAssemblyCache function$Failed to load .NET Framework DLL "%s"$Fusion.dll
                                                                                                        • API String ID: 190572456-3990135632
                                                                                                        • Opcode ID: 64b7f7115ec2050a4f0e42ab113808549d669c8acfba7d9bf3bad921683fe547
                                                                                                        • Instruction ID: 9a538673283cb431493768ab67eac729fe35d93f11f945e2dcd414e2b3f175b6
                                                                                                        • Opcode Fuzzy Hash: 64b7f7115ec2050a4f0e42ab113808549d669c8acfba7d9bf3bad921683fe547
                                                                                                        • Instruction Fuzzy Hash: A2318B70E10649ABCB10FFA5C88169EB7B8EF45315F50857BE814E7382DB389E08C799
                                                                                                        APIs
                                                                                                          • Part of subcall function 0041C048: GetObjectA.GDI32(?,00000018), ref: 0041C055
                                                                                                        • GetFocus.USER32 ref: 0041C168
                                                                                                        • GetDC.USER32(?), ref: 0041C174
                                                                                                        • SelectPalette.GDI32(?,?,00000000), ref: 0041C195
                                                                                                        • RealizePalette.GDI32(?), ref: 0041C1A1
                                                                                                        • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C1B8
                                                                                                        • SelectPalette.GDI32(?,00000000,00000000), ref: 0041C1E0
                                                                                                        • ReleaseDC.USER32(?,?), ref: 0041C1ED
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Palette$Select$BitsFocusObjectRealizeRelease
                                                                                                        • String ID:
                                                                                                        • API String ID: 3303097818-0
                                                                                                        • Opcode ID: 26117fda3ddcda01a6cc84f42a4f6ec069d0e010bd6cdd98afb854c6c7779a8d
                                                                                                        • Instruction ID: 25a0b6576c779426e59073023ceed4ef49f3845c1b310514cd4f08ef327de147
                                                                                                        • Opcode Fuzzy Hash: 26117fda3ddcda01a6cc84f42a4f6ec069d0e010bd6cdd98afb854c6c7779a8d
                                                                                                        • Instruction Fuzzy Hash: 49116D71A44604BFDF10DBE9CC81FAFB7FCEB48700F50486AB518E7281DA7899008B28
                                                                                                        APIs
                                                                                                        • GetSystemMetrics.USER32(0000000E), ref: 00418C70
                                                                                                        • GetSystemMetrics.USER32(0000000D), ref: 00418C78
                                                                                                        • 6F522980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418C7E
                                                                                                          • Part of subcall function 004107F8: 6F51C400.COMCTL32(0049B628,000000FF,00000000,00418CAC,00000000,00418D08,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 004107FC
                                                                                                        • 6F58CB00.COMCTL32(0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418CCE
                                                                                                        • 6F58C740.COMCTL32(00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00418CD9
                                                                                                        • 6F58CB00.COMCTL32(0049B628,00000001,?,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000), ref: 00418CEC
                                                                                                        • 6F520860.COMCTL32(0049B628,00418D0F,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000,0000000E), ref: 00418D02
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: MetricsSystem$C400C740F520860F522980
                                                                                                        • String ID:
                                                                                                        • API String ID: 2856677924-0
                                                                                                        • Opcode ID: e2c7fe5230f8d2f143d47c0d6a7892a097693e1c100db4317caf46c6149257f7
                                                                                                        • Instruction ID: f48c8f8e6a400555c090207229051c9eae11b8a9b20c4da93df477ea8fa1a9e8
                                                                                                        • Opcode Fuzzy Hash: e2c7fe5230f8d2f143d47c0d6a7892a097693e1c100db4317caf46c6149257f7
                                                                                                        • Instruction Fuzzy Hash: 6B112475744204BBDB50EBA9EC82FAD73F8DB08704F504066B514EB2C1DAB9AD808759
                                                                                                        APIs
                                                                                                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,00483D24), ref: 00483D09
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseOpen
                                                                                                        • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                                                                                        • API String ID: 47109696-2530820420
                                                                                                        • Opcode ID: e1bcbbbaaee85d585434023fd650e6813b785c41e8fbc068ac73575afb55ee56
                                                                                                        • Instruction ID: 212569cff1cfb7858b589fbdbabdc9c693f1f7cc945fcf11155ec0ddb5f1f406
                                                                                                        • Opcode Fuzzy Hash: e1bcbbbaaee85d585434023fd650e6813b785c41e8fbc068ac73575afb55ee56
                                                                                                        • Instruction Fuzzy Hash: CC117C30704244AADB10FF65D862B5E7BF9DB45B05F618877A800E7282EB78AE05875C
                                                                                                        APIs
                                                                                                        • SelectObject.GDI32(00000000,?), ref: 0041B470
                                                                                                        • SelectObject.GDI32(?,00000000), ref: 0041B47F
                                                                                                        • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4AB
                                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 0041B4B9
                                                                                                        • SelectObject.GDI32(?,00000000), ref: 0041B4C7
                                                                                                        • DeleteDC.GDI32(00000000), ref: 0041B4D0
                                                                                                        • DeleteDC.GDI32(?), ref: 0041B4D9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ObjectSelect$Delete$Stretch
                                                                                                        • String ID:
                                                                                                        • API String ID: 1458357782-0
                                                                                                        • Opcode ID: 8542cbb8adbe0fd8af4a730cfe3faeef428ae57c020086fb9cb954466ea4b08d
                                                                                                        • Instruction ID: 052e9154069abc57648b404522aaf552eddfcc6d95cd3388d63b7ef9ce004286
                                                                                                        • Opcode Fuzzy Hash: 8542cbb8adbe0fd8af4a730cfe3faeef428ae57c020086fb9cb954466ea4b08d
                                                                                                        • Instruction Fuzzy Hash: 7B115C72E40619ABDB10DAD9DC86FEFB7BCEF08704F144555B614F7282C678AC418BA8
                                                                                                        APIs
                                                                                                        • GetDC.USER32(00000000), ref: 00495519
                                                                                                          • Part of subcall function 0041A1E8: CreateFontIndirectA.GDI32(?), ref: 0041A2A7
                                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 0049553B
                                                                                                        • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,00495AB9), ref: 0049554F
                                                                                                        • GetTextMetricsA.GDI32(00000000,?), ref: 00495571
                                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 0049558E
                                                                                                        Strings
                                                                                                        • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00495546
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Text$CreateExtentFontIndirectMetricsObjectPointReleaseSelect
                                                                                                        • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                                                                                        • API String ID: 2948443157-222967699
                                                                                                        • Opcode ID: 15e89f7ca813e7522845c960856b2cdc022ede195b48aa860a28df6e22a0f939
                                                                                                        • Instruction ID: fbfe8d588f566b1ae935688c8d8bbf43f3780a3d17a9f30f48774e54417b88ea
                                                                                                        • Opcode Fuzzy Hash: 15e89f7ca813e7522845c960856b2cdc022ede195b48aa860a28df6e22a0f939
                                                                                                        • Instruction Fuzzy Hash: 98018476A04704BFEB05DBE9CC41E5EB7EDEB48714F614476F604E7281D678AE008B28
                                                                                                        APIs
                                                                                                        • GetCursorPos.USER32 ref: 004233AF
                                                                                                        • WindowFromPoint.USER32(?,?), ref: 004233BC
                                                                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004233CA
                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 004233D1
                                                                                                        • SendMessageA.USER32(00000000,00000084,?,?), ref: 004233EA
                                                                                                        • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00423401
                                                                                                        • SetCursor.USER32(00000000), ref: 00423413
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                                                                                        • String ID:
                                                                                                        • API String ID: 1770779139-0
                                                                                                        • Opcode ID: 134875e674979cd567c136abb418dc525a6250aa5b529fa10794d0eebf3240cc
                                                                                                        • Instruction ID: 22bb490dc700fc35bbf8fe9eba0271ced42fa0644d0760cf779c582944844a3d
                                                                                                        • Opcode Fuzzy Hash: 134875e674979cd567c136abb418dc525a6250aa5b529fa10794d0eebf3240cc
                                                                                                        • Instruction Fuzzy Hash: BA01D4223046103AD6217B755D82E2F26E8DB85B15F50407FF504BB283DA3D9D11937D
                                                                                                        APIs
                                                                                                        • RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,022B8014,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                                                        • RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,022B8014,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                                                        • LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,022B8014,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                                                        • RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,022B8014,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                                                        • String ID: (^$)^
                                                                                                        • API String ID: 730355536-1313738987
                                                                                                        • Opcode ID: 0971dfa849a4ffc4cae04a3e1ff9e59bd0eaa306d87ad714f1f0155365df5b79
                                                                                                        • Instruction ID: 91310e2de28581c92a9b529d79901d52005bdf0b1253609ef7109df0d78d257f
                                                                                                        • Opcode Fuzzy Hash: 0971dfa849a4ffc4cae04a3e1ff9e59bd0eaa306d87ad714f1f0155365df5b79
                                                                                                        • Instruction Fuzzy Hash: D001A1706482409EE719AB69BA467253FD4D795B48F11803BF840A6BF3C77C4440EBAD
                                                                                                        APIs
                                                                                                        • GetModuleHandleA.KERNEL32(user32.dll), ref: 0049533C
                                                                                                        • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 00495349
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00495356
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc$HandleModule
                                                                                                        • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                                                                                                        • API String ID: 667068680-2254406584
                                                                                                        • Opcode ID: 5579b8dc187442e7c517f6558358e9e0fd6dcc5405420102cd7b083255a2d8af
                                                                                                        • Instruction ID: d6622564654ba01390171a2dbbf88ec7785202fdd48675fe733a6c53722864ad
                                                                                                        • Opcode Fuzzy Hash: 5579b8dc187442e7c517f6558358e9e0fd6dcc5405420102cd7b083255a2d8af
                                                                                                        • Instruction Fuzzy Hash: 7EF0F692741F156ADA3121660C41B7F6B8CCB917B1F240137BE44A7382E9ED8C0047ED
                                                                                                        APIs
                                                                                                        • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressInit), ref: 0045D691
                                                                                                        • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompress), ref: 0045D6A1
                                                                                                        • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressEnd), ref: 0045D6B1
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc
                                                                                                        • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                                                                                                        • API String ID: 190572456-212574377
                                                                                                        • Opcode ID: 0c00d940adfee3eed657d73ca32928dd6beaef8d72542be6af97d79d08c28db7
                                                                                                        • Instruction ID: 26f5c6c79611f6cc0facecefa5b4932716cc5d8e9f8ea2477ead0514974f6e87
                                                                                                        • Opcode Fuzzy Hash: 0c00d940adfee3eed657d73ca32928dd6beaef8d72542be6af97d79d08c28db7
                                                                                                        • Instruction Fuzzy Hash: 0EF01DB0D00705DFD724EFB6ACC672736D5AB6831AF50813B990E95262D778045ACF2C
                                                                                                        APIs
                                                                                                        • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilterEx,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002,00000000,004812C8), ref: 0042EA35
                                                                                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EA3B
                                                                                                        • InterlockedExchange.KERNEL32(0049B668,00000001), ref: 0042EA4C
                                                                                                          • Part of subcall function 0042E9AC: GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA70,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9C2
                                                                                                          • Part of subcall function 0042E9AC: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9C8
                                                                                                          • Part of subcall function 0042E9AC: InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9D9
                                                                                                        • ChangeWindowMessageFilterEx.USER32(00000000,?,00000001,00000000,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042EA60
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressExchangeHandleInterlockedModuleProc$ChangeFilterMessageWindow
                                                                                                        • String ID: ChangeWindowMessageFilterEx$user32.dll
                                                                                                        • API String ID: 142928637-2676053874
                                                                                                        • Opcode ID: 2e6935975283b392abf6eb535232e6e33c7297ce4864da2c850d0b2669d54df9
                                                                                                        • Instruction ID: 20967f7a279d57b19857f2ad39d34e10c6be6de8430a8d3efc5b40b14e24a4c3
                                                                                                        • Opcode Fuzzy Hash: 2e6935975283b392abf6eb535232e6e33c7297ce4864da2c850d0b2669d54df9
                                                                                                        • Instruction Fuzzy Hash: 99E092A1741B20EAEA10B7B67C86FAA2658EB1076DF500037F100A51F1C3BD1C80CE9E
                                                                                                        APIs
                                                                                                        • LoadLibraryA.KERNEL32(oleacc.dll,?,0044F089), ref: 0044C7EB
                                                                                                        • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044C7FC
                                                                                                        • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044C80C
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc$LibraryLoad
                                                                                                        • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                                                                                                        • API String ID: 2238633743-1050967733
                                                                                                        • Opcode ID: 580db4225bb49e0f2395934ae602c4dd6ca827d8c76c18c7318a842ee4a54372
                                                                                                        • Instruction ID: d6497c9818d993b67a5702c7731996643d684f189bbd4b702b1f6e54e13363b7
                                                                                                        • Opcode Fuzzy Hash: 580db4225bb49e0f2395934ae602c4dd6ca827d8c76c18c7318a842ee4a54372
                                                                                                        • Instruction Fuzzy Hash: 50F0DA70282305CAE750BBB5FDD57263694E3A470AF18277BE841551A2C7B94844CB8C
                                                                                                        APIs
                                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,?,00498C24), ref: 00478C26
                                                                                                        • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478C33
                                                                                                        • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478C43
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc$HandleModule
                                                                                                        • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
                                                                                                        • API String ID: 667068680-222143506
                                                                                                        • Opcode ID: 81267d710db967c56e7e702a34d1e8b60bf08845a808e06a5f27e56110be3c01
                                                                                                        • Instruction ID: 32a0137ea675787c0bb1f7a77b9c903aea73f6d33f3aa717a8ad139b0a70eb03
                                                                                                        • Opcode Fuzzy Hash: 81267d710db967c56e7e702a34d1e8b60bf08845a808e06a5f27e56110be3c01
                                                                                                        • Instruction Fuzzy Hash: 4DC0C9F02C1700EEAA01B7B11DCAA7A255CC500728320843F7049BA182D97C0C104F3C
                                                                                                        APIs
                                                                                                        • GetFocus.USER32 ref: 0041B57E
                                                                                                        • GetDC.USER32(?), ref: 0041B58A
                                                                                                        • GetDeviceCaps.GDI32(?,00000068), ref: 0041B5A6
                                                                                                        • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041B5C3
                                                                                                        • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041B5DA
                                                                                                        • ReleaseDC.USER32(?,?), ref: 0041B626
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: EntriesPaletteSystem$CapsDeviceFocusRelease
                                                                                                        • String ID:
                                                                                                        • API String ID: 2502006586-0
                                                                                                        • Opcode ID: e956e6ae92597662ed98b2f51c6b506043ab8b509e5ceb21f610fa5f8f95298e
                                                                                                        • Instruction ID: 1753bd22f5710d4f749a3cf2d8329d0f84e6490acb09e3fae29671003709e3a5
                                                                                                        • Opcode Fuzzy Hash: e956e6ae92597662ed98b2f51c6b506043ab8b509e5ceb21f610fa5f8f95298e
                                                                                                        • Instruction Fuzzy Hash: D0410631A04258AFDF10DFA9C885AAFBBB4EF59704F1484AAF500EB351D3389D51CBA5
                                                                                                        APIs
                                                                                                        • SetLastError.KERNEL32(00000057,00000000,0045D118,?,?,?,?,00000000), ref: 0045D0B7
                                                                                                        • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045D184,?,00000000,0045D118,?,?,?,?,00000000), ref: 0045D0F6
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast
                                                                                                        • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
                                                                                                        • API String ID: 1452528299-1580325520
                                                                                                        • Opcode ID: 44daac30ba6290961f85a10f910adeebe56024b8db7d764ffa7b36a0de599fb3
                                                                                                        • Instruction ID: 81e1e27ad3ae8d1ea1d6b81b4c13ff0be47bc54c17845d393ef4ad8e2f10c1e8
                                                                                                        • Opcode Fuzzy Hash: 44daac30ba6290961f85a10f910adeebe56024b8db7d764ffa7b36a0de599fb3
                                                                                                        • Instruction Fuzzy Hash: 2C117535A04608AFD731DA91C942B9EB6ADDF4470AF6040776D00572C3D67C5F0B992E
                                                                                                        APIs
                                                                                                        • GetSystemMetrics.USER32(0000000B), ref: 0041BDD5
                                                                                                        • GetSystemMetrics.USER32(0000000C), ref: 0041BDDF
                                                                                                        • GetDC.USER32(00000000), ref: 0041BDE9
                                                                                                        • GetDeviceCaps.GDI32(00000000,0000000E), ref: 0041BE10
                                                                                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0041BE1D
                                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 0041BE56
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CapsDeviceMetricsSystem$Release
                                                                                                        • String ID:
                                                                                                        • API String ID: 447804332-0
                                                                                                        • Opcode ID: 3bdc6123dd6674b0137b7fef1a93c0b96d54f33e4692062cf67464f69f8f60e7
                                                                                                        • Instruction ID: d5b995c8e3894394b735eabd433659eae54025482fea58e306a85006fdca5b97
                                                                                                        • Opcode Fuzzy Hash: 3bdc6123dd6674b0137b7fef1a93c0b96d54f33e4692062cf67464f69f8f60e7
                                                                                                        • Instruction Fuzzy Hash: E5212A74E04648AFEB00EFA9C941BEEB7B4EB48714F10846AF514B7690D7785940CB69
                                                                                                        APIs
                                                                                                        • GetWindowLongA.USER32(?,000000EC), ref: 0047E766
                                                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,0046CD49), ref: 0047E78C
                                                                                                        • GetWindowLongA.USER32(?,000000EC), ref: 0047E79C
                                                                                                        • SetWindowLongA.USER32(?,000000EC,00000000), ref: 0047E7BD
                                                                                                        • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 0047E7D1
                                                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 0047E7ED
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Window$Long$Show
                                                                                                        • String ID:
                                                                                                        • API String ID: 3609083571-0
                                                                                                        • Opcode ID: ff63fb1e20feffedf8b27b7393a281f73df7108790e31fa3444cbd3f3be65d10
                                                                                                        • Instruction ID: 463a5c2536fff799c7bf7cf61cbf8045bc8b98cac2b0bb45a0840e8ed8c25010
                                                                                                        • Opcode Fuzzy Hash: ff63fb1e20feffedf8b27b7393a281f73df7108790e31fa3444cbd3f3be65d10
                                                                                                        • Instruction Fuzzy Hash: 53010CB5641210ABEA00D769DE81F6637D8AB1C320F0943A6B959DF3E3C738EC408B49
                                                                                                        APIs
                                                                                                          • Part of subcall function 0041A6E0: CreateBrushIndirect.GDI32 ref: 0041A74B
                                                                                                        • UnrealizeObject.GDI32(00000000), ref: 0041B27C
                                                                                                        • SelectObject.GDI32(?,00000000), ref: 0041B28E
                                                                                                        • SetBkColor.GDI32(?,00000000), ref: 0041B2B1
                                                                                                        • SetBkMode.GDI32(?,00000002), ref: 0041B2BC
                                                                                                        • SetBkColor.GDI32(?,00000000), ref: 0041B2D7
                                                                                                        • SetBkMode.GDI32(?,00000001), ref: 0041B2E2
                                                                                                          • Part of subcall function 0041A058: GetSysColor.USER32(?), ref: 0041A062
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                                                                                        • String ID:
                                                                                                        • API String ID: 3527656728-0
                                                                                                        • Opcode ID: 90af7722afa79acc590a6ee3060039fb524340e2cf7ce152cccbdcb584e8dbde
                                                                                                        • Instruction ID: d03b18a2b949c207061bd18b8e5d47ed8ce294e6be165222704fda36eef26a4f
                                                                                                        • Opcode Fuzzy Hash: 90af7722afa79acc590a6ee3060039fb524340e2cf7ce152cccbdcb584e8dbde
                                                                                                        • Instruction Fuzzy Hash: 56F0CD756015009BDE00FFAAD9CBE4B3B989F043097048496B908DF187CA3CD8649B3A
                                                                                                        APIs
                                                                                                        • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,!nI,_iu,?,00000000,004539F6), ref: 004539AB
                                                                                                        • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,!nI,_iu,?,00000000,004539F6), ref: 004539BB
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseCreateFileHandle
                                                                                                        • String ID: !nI$.tmp$_iu
                                                                                                        • API String ID: 3498533004-584216493
                                                                                                        • Opcode ID: 1dee75e2bfc2da78c26475f080e8b0a4db6a1a73d39b0bf1d20dabbe4352c150
                                                                                                        • Instruction ID: 7da7e9bbb2667b7856572ae533a3071efe8e017fb0344d9459fa270775feb22d
                                                                                                        • Opcode Fuzzy Hash: 1dee75e2bfc2da78c26475f080e8b0a4db6a1a73d39b0bf1d20dabbe4352c150
                                                                                                        • Instruction Fuzzy Hash: 1831C5B0A00249ABCB11EF95D842B9EBBB4AF44345F20453AF810B73C2D7785F058B69
                                                                                                        APIs
                                                                                                          • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
                                                                                                        • ShowWindow.USER32(?,00000005,00000000,00497FC1,?,?,00000000), ref: 00497D92
                                                                                                          • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                                                                          • Part of subcall function 004072A8: SetCurrentDirectoryA.KERNEL32(00000000,?,00497DBA,00000000,00497F8D,?,?,00000005,00000000,00497FC1,?,?,00000000), ref: 004072B3
                                                                                                          • Part of subcall function 0042D44C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4DA,?,?,?,00000001,?,0045607E,00000000,004560E6), ref: 0042D481
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
                                                                                                        • String ID: .dat$.msg$IMsg$Uninstall
                                                                                                        • API String ID: 3312786188-1660910688
                                                                                                        • Opcode ID: f79b411802c9da3a9116882e1755ce4b3781acbc659f3f1c23c36e526850363e
                                                                                                        • Instruction ID: abb28459e614be91aca1b68aa70fad33032f6e559e3bf784a216f74f74fa669e
                                                                                                        • Opcode Fuzzy Hash: f79b411802c9da3a9116882e1755ce4b3781acbc659f3f1c23c36e526850363e
                                                                                                        • Instruction Fuzzy Hash: 89314F34A14114AFCB00EF65DD9296E7BB5EF89314F91857AF800AB395DB38BD01CB68
                                                                                                        APIs
                                                                                                        • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonCreate), ref: 0042EADA
                                                                                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EAE0
                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042EB09
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressByteCharHandleModuleMultiProcWide
                                                                                                        • String ID: ShutdownBlockReasonCreate$user32.dll
                                                                                                        • API String ID: 828529508-2866557904
                                                                                                        • Opcode ID: eb577c3347fbf9fd6a249885fcfc34f4074b2fa1c1d8d6afc25abb851ecf655c
                                                                                                        • Instruction ID: 7e091cf0cf0c4dae12ae48626bdfb721f4796128e550bb25d34418d77cfbcdd5
                                                                                                        • Opcode Fuzzy Hash: eb577c3347fbf9fd6a249885fcfc34f4074b2fa1c1d8d6afc25abb851ecf655c
                                                                                                        • Instruction Fuzzy Hash: 70F0C8D034061136E620B57F5C82F7B598C8F94759F140436B109E62C2D96CA905426E
                                                                                                        APIs
                                                                                                        • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 00458028
                                                                                                        • GetExitCodeProcess.KERNEL32(?,?), ref: 00458049
                                                                                                        • CloseHandle.KERNEL32(?,0045807C), ref: 0045806F
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
                                                                                                        • String ID: GetExitCodeProcess$MsgWaitForMultipleObjects
                                                                                                        • API String ID: 2573145106-3235461205
                                                                                                        • Opcode ID: f4b7924840392a1c056809c60f673386a353f05297e24ea8de8fb179b7d06f04
                                                                                                        • Instruction ID: 2f0632834368beac7d1c7250186d6a5b4d0e74160b608b18ba1b2b0c741dc3d5
                                                                                                        • Opcode Fuzzy Hash: f4b7924840392a1c056809c60f673386a353f05297e24ea8de8fb179b7d06f04
                                                                                                        • Instruction Fuzzy Hash: 8101A231600204AFD710EBA98C02A5A73A8EB49B25F51407BFC10E73D3DE399E08965D
                                                                                                        APIs
                                                                                                        • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA70,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9C2
                                                                                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9C8
                                                                                                        • InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9D9
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressExchangeHandleInterlockedModuleProc
                                                                                                        • String ID: ChangeWindowMessageFilter$user32.dll
                                                                                                        • API String ID: 3478007392-2498399450
                                                                                                        • Opcode ID: 3254194633b527647525dea76c004eb0f33bc99a9c522dc813bf1be520244ffe
                                                                                                        • Instruction ID: c922fa4e85abb1c6873f36dcd01b6443d81c66d6c3501223796626af46e79b09
                                                                                                        • Opcode Fuzzy Hash: 3254194633b527647525dea76c004eb0f33bc99a9c522dc813bf1be520244ffe
                                                                                                        • Instruction Fuzzy Hash: 5CE0ECB2740324EADA103B627E8AF663558E724B19F50043BF001751F1C7FD1C80CA9E
                                                                                                        APIs
                                                                                                        • GetWindowThreadProcessId.USER32(00000000), ref: 00477B9C
                                                                                                        • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477C93,0049C0A8,00000000), ref: 00477BAF
                                                                                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477BB5
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressHandleModuleProcProcessThreadWindow
                                                                                                        • String ID: AllowSetForegroundWindow$user32.dll
                                                                                                        • API String ID: 1782028327-3855017861
                                                                                                        • Opcode ID: 0c48b0152dcd94fde7082f0574e48419f86d5c04df14efc0ca492c8631bf730a
                                                                                                        • Instruction ID: d51ed2a8d8be4cb67b0f2e6afaff03014389f5b4c9f6752a27b175deb1fe6994
                                                                                                        • Opcode Fuzzy Hash: 0c48b0152dcd94fde7082f0574e48419f86d5c04df14efc0ca492c8631bf730a
                                                                                                        • Instruction Fuzzy Hash: D7D0C790248701B9D910B3F64D46E9F3A5D894471CB50C47BB418E61C5DA7CFD04893D
                                                                                                        APIs
                                                                                                        • BeginPaint.USER32(00000000,?), ref: 00416C52
                                                                                                        • SaveDC.GDI32(?), ref: 00416C83
                                                                                                        • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00416D45), ref: 00416CE4
                                                                                                        • RestoreDC.GDI32(?,?), ref: 00416D0B
                                                                                                        • EndPaint.USER32(00000000,?,00416D4C,00000000,00416D45), ref: 00416D3F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Paint$BeginClipExcludeRectRestoreSave
                                                                                                        • String ID:
                                                                                                        • API String ID: 3808407030-0
                                                                                                        • Opcode ID: ad781fe6fb59047a66b80eb53a3f65b2019eba16d1c733f202b60e39d660354f
                                                                                                        • Instruction ID: 8164e3b37c2b38cc39b91ef4074089abf19b8963c3e0e5cbd12a4ce3d65b1abe
                                                                                                        • Opcode Fuzzy Hash: ad781fe6fb59047a66b80eb53a3f65b2019eba16d1c733f202b60e39d660354f
                                                                                                        • Instruction Fuzzy Hash: A1415070A002049FCB14DBA9C585FAA77F9FF48304F1540AEE8459B362D778DD81CB58
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b6913cb722474124f75cff2ee5949f067bbdde1b56a592e148b6496e85af3d5a
                                                                                                        • Instruction ID: a833d86c80f2fb81cba799e3b93fc1891ddf3ebdd98a67124a25423b7ab76754
                                                                                                        • Opcode Fuzzy Hash: b6913cb722474124f75cff2ee5949f067bbdde1b56a592e148b6496e85af3d5a
                                                                                                        • Instruction Fuzzy Hash: 563132746057809FC320EF69C984B9BB7E8AF89354F04491EF9D5C3752C638E8818F19
                                                                                                        APIs
                                                                                                        • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429808
                                                                                                        • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429837
                                                                                                        • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 00429853
                                                                                                        • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 0042987E
                                                                                                        • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 0042989C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: MessageSend
                                                                                                        • String ID:
                                                                                                        • API String ID: 3850602802-0
                                                                                                        • Opcode ID: 399f588db94bb8b810bf5b46e1237ea7bfd7cbebe0e15a3dbf36720fb68daebb
                                                                                                        • Instruction ID: 8b65b0e689063cc909dba6714575951256d1ad54ff8cece17fd29570ea6901c2
                                                                                                        • Opcode Fuzzy Hash: 399f588db94bb8b810bf5b46e1237ea7bfd7cbebe0e15a3dbf36720fb68daebb
                                                                                                        • Instruction Fuzzy Hash: 6E219D707107057BEB10AB62DC82F5B7AECAB41708F54443EB501AB2D2DFB8AE418228
                                                                                                        APIs
                                                                                                        • GetSystemMetrics.USER32(0000000B), ref: 0041BBCA
                                                                                                        • GetSystemMetrics.USER32(0000000C), ref: 0041BBD4
                                                                                                        • GetDC.USER32(00000000), ref: 0041BC12
                                                                                                        • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BC59
                                                                                                        • DeleteObject.GDI32(00000000), ref: 0041BC9A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: MetricsSystem$BitmapCreateDeleteObject
                                                                                                        • String ID:
                                                                                                        • API String ID: 1095203571-0
                                                                                                        • Opcode ID: d6ecec59309c4539c21f746b1d4641e0a999657a412e1d938322a226e3514674
                                                                                                        • Instruction ID: 2a907a32995036c4e239f44386a828d3a2f1e7d44945ead90e55d18394f4d4ff
                                                                                                        • Opcode Fuzzy Hash: d6ecec59309c4539c21f746b1d4641e0a999657a412e1d938322a226e3514674
                                                                                                        • Instruction Fuzzy Hash: 5D315C70E00208EFDB04DFA5C941AAEB7F5EB48700F2084AAF514AB781D7789E40DB98
                                                                                                        APIs
                                                                                                          • Part of subcall function 0045D04C: SetLastError.KERNEL32(00000057,00000000,0045D118,?,?,?,?,00000000), ref: 0045D0B7
                                                                                                        • GetLastError.KERNEL32(00000000,00000000,00000000,004736AC,?,?,0049C1E0,00000000), ref: 00473665
                                                                                                        • GetLastError.KERNEL32(00000000,00000000,00000000,004736AC,?,?,0049C1E0,00000000), ref: 0047367B
                                                                                                        Strings
                                                                                                        • Setting permissions on registry key: %s\%s, xrefs: 0047362A
                                                                                                        • Could not set permissions on the registry key because it currently does not exist., xrefs: 0047366F
                                                                                                        • Failed to set permissions on registry key (%d)., xrefs: 0047368C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast
                                                                                                        • String ID: Could not set permissions on the registry key because it currently does not exist.$Failed to set permissions on registry key (%d).$Setting permissions on registry key: %s\%s
                                                                                                        • API String ID: 1452528299-4018462623
                                                                                                        • Opcode ID: 2cd14b75b874af61ac3d45831295ca4897b993e1bd4af745d48f10d6dc1171d0
                                                                                                        • Instruction ID: ad6b00cc897a6d1501f3fc6a2a631de3da5dc8c6e7b4eccdfad28332e4495c63
                                                                                                        • Opcode Fuzzy Hash: 2cd14b75b874af61ac3d45831295ca4897b993e1bd4af745d48f10d6dc1171d0
                                                                                                        • Instruction Fuzzy Hash: A121C870A046445FCB10DFA9C8826EEBBE4DF49319F50817BE408E7392D7785E098B6D
                                                                                                        APIs
                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                                        • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
                                                                                                        • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ByteCharMultiWide$AllocString
                                                                                                        • String ID:
                                                                                                        • API String ID: 262959230-0
                                                                                                        • Opcode ID: dcd45591e65b03bd276bb2a5b0fabad56ebf76f0c081827c2345b0a7b763a240
                                                                                                        • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
                                                                                                        • Opcode Fuzzy Hash: dcd45591e65b03bd276bb2a5b0fabad56ebf76f0c081827c2345b0a7b763a240
                                                                                                        • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
                                                                                                        APIs
                                                                                                        • SelectPalette.GDI32(00000000,00000000,00000000), ref: 00414419
                                                                                                        • RealizePalette.GDI32(00000000), ref: 00414421
                                                                                                        • SelectPalette.GDI32(00000000,00000000,00000001), ref: 00414435
                                                                                                        • RealizePalette.GDI32(00000000), ref: 0041443B
                                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00414446
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Palette$RealizeSelect$Release
                                                                                                        • String ID:
                                                                                                        • API String ID: 2261976640-0
                                                                                                        • Opcode ID: c9c8aa66f6917016d7555c0ac5b3df2d15848593dde74026b2272496f15e705b
                                                                                                        • Instruction ID: 3cc421e061c7a323c9855e33cbe13bf4890882f9e8533d15179bd5f7679f66d2
                                                                                                        • Opcode Fuzzy Hash: c9c8aa66f6917016d7555c0ac5b3df2d15848593dde74026b2272496f15e705b
                                                                                                        • Instruction Fuzzy Hash: A2018F7520C3806AE600A63D8C85A9F6BED9FCA718F15446EF495DB282DA7AC8018765
                                                                                                        APIs
                                                                                                          • Part of subcall function 0041F074: GetActiveWindow.USER32 ref: 0041F077
                                                                                                          • Part of subcall function 0041F074: GetCurrentThreadId.KERNEL32 ref: 0041F08C
                                                                                                          • Part of subcall function 0041F074: EnumThreadWindows.USER32(00000000,Function_0001F050), ref: 0041F092
                                                                                                          • Part of subcall function 004231A8: GetSystemMetrics.USER32(00000000), ref: 004231AA
                                                                                                        • OffsetRect.USER32(?,?,?), ref: 00424DC9
                                                                                                        • DrawTextA.USER32(00000000,00000000,000000FF,?,00000C10), ref: 00424E8C
                                                                                                        • OffsetRect.USER32(?,?,?), ref: 00424E9D
                                                                                                          • Part of subcall function 00423564: GetCurrentThreadId.KERNEL32 ref: 00423579
                                                                                                          • Part of subcall function 00423564: SetWindowsHookExA.USER32(00000003,00423520,00000000,00000000), ref: 00423589
                                                                                                          • Part of subcall function 00423564: CreateThread.KERNEL32(00000000,000003E8,004234D0,00000000,00000000), ref: 004235AD
                                                                                                          • Part of subcall function 00424B2C: SetTimer.USER32(00000000,00000001,?,004234B4), ref: 00424B47
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Thread$CurrentOffsetRectWindows$ActiveCreateDrawEnumHookMetricsSystemTextTimerWindow
                                                                                                        • String ID: vLB
                                                                                                        • API String ID: 1477829881-1797516613
                                                                                                        • Opcode ID: af4d35ceb7da7411f9a909d8da5f62e109762c4c9dbecdeb02cfa42cc05a337b
                                                                                                        • Instruction ID: 1a85cd152e58b5c2614c87f396891e2b5808bef0cf689969089b0637ec596c27
                                                                                                        • Opcode Fuzzy Hash: af4d35ceb7da7411f9a909d8da5f62e109762c4c9dbecdeb02cfa42cc05a337b
                                                                                                        • Instruction Fuzzy Hash: C5812675A003188FCB14DFA8D880ADEBBF4FF88314F50416AE905AB296E738AD45CF44
                                                                                                        APIs
                                                                                                        • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 00407003
                                                                                                        • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 0040707D
                                                                                                        • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 004070D5
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Enum$NameOpenResourceUniversal
                                                                                                        • String ID: Z
                                                                                                        • API String ID: 3604996873-1505515367
                                                                                                        • Opcode ID: a9e747af3270ad6827a26b5e12e82ea9da9777e5f51a79d453bfa0d7b97e4fbe
                                                                                                        • Instruction ID: 78f4b6eea80f90a9c0d6dbacb1000d6f5057f9b0a0312f2c839bfa0eabc808a5
                                                                                                        • Opcode Fuzzy Hash: a9e747af3270ad6827a26b5e12e82ea9da9777e5f51a79d453bfa0d7b97e4fbe
                                                                                                        • Instruction Fuzzy Hash: 14516470E04208AFDB11DF95C951AAFBBB9EF09304F1045BAE500BB3D1D778AE458B5A
                                                                                                        APIs
                                                                                                        • SetRectEmpty.USER32(?), ref: 0044D04E
                                                                                                        • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044D079
                                                                                                        • DrawTextA.USER32(00000000,00000000,00000000,00000000,00000800), ref: 0044D101
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: DrawText$EmptyRect
                                                                                                        • String ID:
                                                                                                        • API String ID: 182455014-2867612384
                                                                                                        • Opcode ID: 9cefa38d4a8adbc35dceb9fbd70f94003a2f7c245499b58eac7a7a86e34dc042
                                                                                                        • Instruction ID: ac611c4ae9e9b4e435f74cd3b872a097dcdbbef8ea8fa2dc8c743a2ef399c877
                                                                                                        • Opcode Fuzzy Hash: 9cefa38d4a8adbc35dceb9fbd70f94003a2f7c245499b58eac7a7a86e34dc042
                                                                                                        • Instruction Fuzzy Hash: 18517171E00248AFDB11DFA5C885BDEBBF8BF48308F18447AE845EB252D7789945CB64
                                                                                                        APIs
                                                                                                        • GetDC.USER32(00000000), ref: 0042EF9E
                                                                                                          • Part of subcall function 0041A1E8: CreateFontIndirectA.GDI32(?), ref: 0041A2A7
                                                                                                        • SelectObject.GDI32(?,00000000), ref: 0042EFC1
                                                                                                        • ReleaseDC.USER32(00000000,?), ref: 0042F0A0
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateFontIndirectObjectReleaseSelect
                                                                                                        • String ID: ...\
                                                                                                        • API String ID: 3133960002-983595016
                                                                                                        • Opcode ID: 174dea87e3c77845355dc2bffde9c2636390ac865bcfddee608935e642ca7c05
                                                                                                        • Instruction ID: de545d42c11d103cbad381cc3223c2b5efa9fdb4a6e9ae4bb0445229962d8c70
                                                                                                        • Opcode Fuzzy Hash: 174dea87e3c77845355dc2bffde9c2636390ac865bcfddee608935e642ca7c05
                                                                                                        • Instruction Fuzzy Hash: 5A316370B00128AFDB11EB96D841BAEB7F8EB09348F90447BE410A7392D7785E49CA59
                                                                                                        APIs
                                                                                                        • GetFileAttributesA.KERNEL32(00000000,00498B60,00000000,00498306,?,?,00000000,0049B628), ref: 00498280
                                                                                                        • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00498B60,00000000,00498306,?,?,00000000,0049B628), ref: 004982A9
                                                                                                        • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 004982C2
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: File$Attributes$Move
                                                                                                        • String ID: isRS-%.3u.tmp
                                                                                                        • API String ID: 3839737484-3657609586
                                                                                                        • Opcode ID: 6425da845d9cf075168c9006b2f4cde8adeeb665172db9fe24e9d2d56fbf6a76
                                                                                                        • Instruction ID: fc33356634acd7bce8b4c2965ae56e8bcff63ef6fc68eceab8a95db248f88364
                                                                                                        • Opcode Fuzzy Hash: 6425da845d9cf075168c9006b2f4cde8adeeb665172db9fe24e9d2d56fbf6a76
                                                                                                        • Instruction Fuzzy Hash: 0B216471E00609ABCF10EFA9C8819AFBBB8AF45714F10457FB814B72D1DB389E018A59
                                                                                                        APIs
                                                                                                        • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
                                                                                                        • ExitProcess.KERNEL32 ref: 00404E0D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ExitMessageProcess
                                                                                                        • String ID: Error$Runtime error at 00000000
                                                                                                        • API String ID: 1220098344-2970929446
                                                                                                        • Opcode ID: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                                                                                                        • Instruction ID: e2df0dcbf1ce8e07228a8ae3c957e3f7be2bf5582065763199918d440bd3f461
                                                                                                        • Opcode Fuzzy Hash: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                                                                                                        • Instruction Fuzzy Hash: 8E219560A442414ADB11A779BA8571B3B91D7E5348F04817BE710A73E3C77C8C4487ED
                                                                                                        APIs
                                                                                                          • Part of subcall function 0042C804: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C828
                                                                                                          • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                                          • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                                        • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 00456C50
                                                                                                        • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00456C7D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                                                                                                        • String ID: LoadTypeLib$RegisterTypeLib
                                                                                                        • API String ID: 1312246647-2435364021
                                                                                                        • Opcode ID: 99adc2ab1761f2fa15f1ac99c5dc87c93e60f5f8f6cafab150dd189b668492eb
                                                                                                        • Instruction ID: 3ed1135b8019c5f4588910a0035f5c9e1cabb82a18fedb82429c118dce795412
                                                                                                        • Opcode Fuzzy Hash: 99adc2ab1761f2fa15f1ac99c5dc87c93e60f5f8f6cafab150dd189b668492eb
                                                                                                        • Instruction Fuzzy Hash: 2911B430B00604AFDB02EFA6CD51A5EB7BDEB89705F5184B6FC44D3752DA389904CA24
                                                                                                        APIs
                                                                                                        • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 0045716E
                                                                                                        • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 0045720B
                                                                                                        Strings
                                                                                                        • Failed to create DebugClientWnd, xrefs: 004571D4
                                                                                                        • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 0045719A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: MessageSend
                                                                                                        • String ID: Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)$Failed to create DebugClientWnd
                                                                                                        • API String ID: 3850602802-3720027226
                                                                                                        • Opcode ID: 3689ec14d1edae2f57f0a744906126f7255bff4f1947e1d6bbead030c2853570
                                                                                                        • Instruction ID: a6ca84080c04e90ac639e3db27cd2c1e4b46fe4ea5f20cae781d9f83c3d7e460
                                                                                                        • Opcode Fuzzy Hash: 3689ec14d1edae2f57f0a744906126f7255bff4f1947e1d6bbead030c2853570
                                                                                                        • Instruction Fuzzy Hash: 1011E770248240AFD710AB69AC85B5FBBD89B54319F15407AFA849B383D7798C18C7AE
                                                                                                        APIs
                                                                                                          • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
                                                                                                        • GetFocus.USER32 ref: 00478757
                                                                                                        • GetKeyState.USER32(0000007A), ref: 00478769
                                                                                                        • WaitMessage.USER32(?,00000000,00478790,?,00000000,004787B7,?,?,00000001,00000000,?,?,?,00480402,00000000,004812C8), ref: 00478773
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FocusMessageStateTextWaitWindow
                                                                                                        • String ID: Wnd=$%x
                                                                                                        • API String ID: 1381870634-2927251529
                                                                                                        • Opcode ID: c0ca7a1e78f0957e158d44939737d51478939e9ac1b0c689120181bc9166dade
                                                                                                        • Instruction ID: f17a5035e7dee30901ec9a03c3a5a372f1d0714b29ccd98a4f066b2945bd060b
                                                                                                        • Opcode Fuzzy Hash: c0ca7a1e78f0957e158d44939737d51478939e9ac1b0c689120181bc9166dade
                                                                                                        • Instruction Fuzzy Hash: CE11C634A40244AFD704EF65DC49A9EBBF8EB49314F6184BFF409E7681DB386D00CA69
                                                                                                        APIs
                                                                                                        • FileTimeToLocalFileTime.KERNEL32(?), ref: 0046E618
                                                                                                        • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 0046E627
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Time$File$LocalSystem
                                                                                                        • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                                                                                                        • API String ID: 1748579591-1013271723
                                                                                                        • Opcode ID: 93d3f9926fe1e9ec47fc0153e923e0389e011619b8f85a7a05f57e02ab74589b
                                                                                                        • Instruction ID: 5dd65cae4c1adac9d47cc9ad6336eda1851498fedff4a8a979bd050f9c4a6815
                                                                                                        • Opcode Fuzzy Hash: 93d3f9926fe1e9ec47fc0153e923e0389e011619b8f85a7a05f57e02ab74589b
                                                                                                        • Instruction Fuzzy Hash: A81136A440C3909ED340DF2AC04432BBAE4AB99704F44892EF8C8C6381E779C848DBB7
                                                                                                        APIs
                                                                                                        • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 00453F83
                                                                                                          • Part of subcall function 00406F50: DeleteFileA.KERNEL32(00000000,0049B628,004986F1,00000000,00498746,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F5B
                                                                                                        • MoveFileA.KERNEL32(00000000,00000000), ref: 00453FA8
                                                                                                          • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: File$AttributesDeleteErrorLastMove
                                                                                                        • String ID: DeleteFile$MoveFile
                                                                                                        • API String ID: 3024442154-139070271
                                                                                                        • Opcode ID: ad4ba0b838e9d5317ad6887f6d8cb75152b6b17696a4ed4ee46c007163692804
                                                                                                        • Instruction ID: b5871bee3d194af1fa843ac656f6d820fc0ba16d57580c91db5694710367c43f
                                                                                                        • Opcode Fuzzy Hash: ad4ba0b838e9d5317ad6887f6d8cb75152b6b17696a4ed4ee46c007163692804
                                                                                                        • Instruction Fuzzy Hash: AEF062716142045BD701FBA2D84266EA7ECDB8435EF60443BB900BB6C3DA3C9E094529
                                                                                                        APIs
                                                                                                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,004594A1,00000000,00459659,?,00000000,00000000,00000000), ref: 004593B1
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseOpen
                                                                                                        • String ID: .NET Framework not found$InstallRoot$SOFTWARE\Microsoft\.NETFramework
                                                                                                        • API String ID: 47109696-2631785700
                                                                                                        • Opcode ID: be4fb59b900ee74e718d87cdc4fcd1eef43a9c564c0a5ec1af3f625bb6e6dd39
                                                                                                        • Instruction ID: 1950c6f853cc10ed35e504d9d8503a730f6ffd27dc9bba4e9fa27fab35675349
                                                                                                        • Opcode Fuzzy Hash: be4fb59b900ee74e718d87cdc4fcd1eef43a9c564c0a5ec1af3f625bb6e6dd39
                                                                                                        • Instruction Fuzzy Hash: 12F0AF31300110DBCB10EB9AD885B6F6299DB9931AF50503BF981DB293E73CCC168629
                                                                                                        APIs
                                                                                                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                                        • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00483C05
                                                                                                        • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00483C28
                                                                                                        Strings
                                                                                                        • System\CurrentControlSet\Control\Windows, xrefs: 00483BD2
                                                                                                        • CSDVersion, xrefs: 00483BFC
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseOpenQueryValue
                                                                                                        • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                                                                                                        • API String ID: 3677997916-1910633163
                                                                                                        • Opcode ID: 33fca6af7241f4b653fe53c350a6e88c669f1de2ef3da1c7a1752152dae0c121
                                                                                                        • Instruction ID: 1d850e848a14c5c59b8e95f13e5f63a8fb365af486cc5d6c9f9b701d22fca986
                                                                                                        • Opcode Fuzzy Hash: 33fca6af7241f4b653fe53c350a6e88c669f1de2ef3da1c7a1752152dae0c121
                                                                                                        • Instruction Fuzzy Hash: 56F03176E40208A6DF10EAD48C45BAFB3BCAB14B05F104967EA10F7280E678AB048B59
                                                                                                        APIs
                                                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453B5A,00000000,00453BFD,?,?,00000000,00000000,00000000,00000000,00000000,?,00453FED,00000000), ref: 0042D90A
                                                                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D910
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressHandleModuleProc
                                                                                                        • String ID: GetSystemWow64DirectoryA$kernel32.dll
                                                                                                        • API String ID: 1646373207-4063490227
                                                                                                        • Opcode ID: 3965e48138ab8598cb17ff311cd558fd433aca8a834515e354a81fb776e31baf
                                                                                                        • Instruction ID: 657275fb9dfacbe144619f02b172540cf2f0c5a6f4252bec6bd03a25d2dd35a2
                                                                                                        • Opcode Fuzzy Hash: 3965e48138ab8598cb17ff311cd558fd433aca8a834515e354a81fb776e31baf
                                                                                                        • Instruction Fuzzy Hash: A5E0DFE0B40B0122D70032BA1C82B6B108D4B84728F90053B3894E62D6DDBCD9840A6D
                                                                                                        APIs
                                                                                                        • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042EAD0), ref: 0042EB62
                                                                                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EB68
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressHandleModuleProc
                                                                                                        • String ID: ShutdownBlockReasonDestroy$user32.dll
                                                                                                        • API String ID: 1646373207-260599015
                                                                                                        • Opcode ID: 88ce12e330a2fc51ece58c284b54de3a76b504cb94a4c995bd1a3fb2c6ea0693
                                                                                                        • Instruction ID: e1ec077e445c8734ae54db5ffdd633522f5c412f0b7fee52e54de0d29bb4c321
                                                                                                        • Opcode Fuzzy Hash: 88ce12e330a2fc51ece58c284b54de3a76b504cb94a4c995bd1a3fb2c6ea0693
                                                                                                        • Instruction Fuzzy Hash: A2D0C793311732665D10B1F73CD1EAB058C891527935404B7F515E5641D55DEC1115AD
                                                                                                        APIs
                                                                                                        • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,00498BF2), ref: 0044F77F
                                                                                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F785
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressHandleModuleProc
                                                                                                        • String ID: NotifyWinEvent$user32.dll
                                                                                                        • API String ID: 1646373207-597752486
                                                                                                        • Opcode ID: f97c3de5cacafbf63d36e16939e29d51eb7e912e87a0fb2b79f6fc39cd446e20
                                                                                                        • Instruction ID: 5e946f17392c81a4f172a46fe169fb9a1f72c9003761a5edf28bd31acc2f1150
                                                                                                        • Opcode Fuzzy Hash: f97c3de5cacafbf63d36e16939e29d51eb7e912e87a0fb2b79f6fc39cd446e20
                                                                                                        • Instruction Fuzzy Hash: 59E012F0E417049AFF00BBB57B86B1A3A90E764719B00057FF414A6292DB7C481C4F9D
                                                                                                        APIs
                                                                                                        • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498C48,00000001,00000000,00498C6C), ref: 00498972
                                                                                                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498978
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressHandleModuleProc
                                                                                                        • String ID: DisableProcessWindowsGhosting$user32.dll
                                                                                                        • API String ID: 1646373207-834958232
                                                                                                        • Opcode ID: 71af8591fbce5d4533a7188bae6238bebf63b2f5996384562a89c67780edd1c3
                                                                                                        • Instruction ID: 34f838485a85c0df890c3e192e44216071158a5cea444d63bbc0a0b2480586ef
                                                                                                        • Opcode Fuzzy Hash: 71af8591fbce5d4533a7188bae6238bebf63b2f5996384562a89c67780edd1c3
                                                                                                        • Instruction Fuzzy Hash: 22B002C0651707589D5032FA0D06B3F48484C5276D728057F3414A51C6DD6C89115D3F
                                                                                                        APIs
                                                                                                          • Part of subcall function 0044B658: LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F775,00498BF2), ref: 0044B67F
                                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B697
                                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6A9
                                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6BB
                                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6CD
                                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6DF
                                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6F1
                                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B703
                                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B715
                                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B727
                                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B739
                                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B74B
                                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B75D
                                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B76F
                                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B781
                                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B793
                                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7A5
                                                                                                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7B7
                                                                                                        • LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00498C1A), ref: 00464603
                                                                                                        • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464609
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc$LibraryLoad
                                                                                                        • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                                                        • API String ID: 2238633743-2683653824
                                                                                                        • Opcode ID: edc6f8ec64a36a5908760ff58e990ea99ea877eb638915fc896b3384d426fa6b
                                                                                                        • Instruction ID: ed4894befccbfeda2ad80f7d1b9e1cb4df1a551eae9986247d0c145e26b1cd95
                                                                                                        • Opcode Fuzzy Hash: edc6f8ec64a36a5908760ff58e990ea99ea877eb638915fc896b3384d426fa6b
                                                                                                        • Instruction Fuzzy Hash: DDB092D0A82740A4C90077F2985B90F2A4488A271EB10153B710476483EABC84100EAE
                                                                                                        APIs
                                                                                                        • FindNextFileA.KERNEL32(000000FF,?,00000000,0047D7F0,?,?,?,?,00000000,0047D945,?,?,?,00000000,?,0047DA54), ref: 0047D7CC
                                                                                                        • FindClose.KERNEL32(000000FF,0047D7F7,0047D7F0,?,?,?,?,00000000,0047D945,?,?,?,00000000,?,0047DA54,00000000), ref: 0047D7EA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Find$CloseFileNext
                                                                                                        • String ID:
                                                                                                        • API String ID: 2066263336-0
                                                                                                        • Opcode ID: df8c12b404288ac1cc0f16a4307cfa19f630790b74cd409a531bdd723e619500
                                                                                                        • Instruction ID: 2ce97de6e4eb512f8d4c2eb376340b964b0e691095a652a34be041e4083b4e02
                                                                                                        • Opcode Fuzzy Hash: df8c12b404288ac1cc0f16a4307cfa19f630790b74cd409a531bdd723e619500
                                                                                                        • Instruction Fuzzy Hash: 07813A74D0024D9FCF11EFA5CC91ADFBBB8EF49304F5080AAE908A7291D6399A46CF54
                                                                                                        APIs
                                                                                                          • Part of subcall function 0042EE30: GetTickCount.KERNEL32 ref: 0042EE36
                                                                                                          • Part of subcall function 0042EC88: MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0042ECBD
                                                                                                        • GetLastError.KERNEL32(00000000,00475721,?,?,0049C1E0,00000000), ref: 0047560A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CountErrorFileLastMoveTick
                                                                                                        • String ID: $LoggedMsgBox returned an unexpected value. Assuming Cancel.$MoveFileEx
                                                                                                        • API String ID: 2406187244-2685451598
                                                                                                        • Opcode ID: b4e541c37b522712e9a51433fba2d6f7c47cca6c6c5b44fd3a0118cd85a505a9
                                                                                                        • Instruction ID: cfe7f312216358cbd0971b398f0cafde252de4893b1317a5ce8d70824cf78b76
                                                                                                        • Opcode Fuzzy Hash: b4e541c37b522712e9a51433fba2d6f7c47cca6c6c5b44fd3a0118cd85a505a9
                                                                                                        • Instruction Fuzzy Hash: 4D418570A006099BDB10EFA5D882AEF77B5FF48314F508537E408BB395D7789A058BA9
                                                                                                        APIs
                                                                                                        • GetDesktopWindow.USER32 ref: 00413D46
                                                                                                        • GetDesktopWindow.USER32 ref: 00413DFE
                                                                                                          • Part of subcall function 00418EC0: 6F58C6F0.COMCTL32(?,00000000,00413FC3,00000000,004140D3,?,?,0049B628), ref: 00418EDC
                                                                                                          • Part of subcall function 00418EC0: ShowCursor.USER32(00000001,?,00000000,00413FC3,00000000,004140D3,?,?,0049B628), ref: 00418EF9
                                                                                                        • SetCursor.USER32(00000000,?,?,?,?,00413AF3,00000000,00413B06), ref: 00413E3C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CursorDesktopWindow$Show
                                                                                                        • String ID:
                                                                                                        • API String ID: 2074268717-0
                                                                                                        • Opcode ID: 48e3412c1a46991eea637d4b1b247886da5b7466a2ee9d80c19fa9edf3c8b710
                                                                                                        • Instruction ID: d0219f8535474b9b7e790bb207accfb6dce16a9ac66decbe361331da1304c66b
                                                                                                        • Opcode Fuzzy Hash: 48e3412c1a46991eea637d4b1b247886da5b7466a2ee9d80c19fa9edf3c8b710
                                                                                                        • Instruction Fuzzy Hash: 91412C75600210AFC710DF2AFA84B56B7E1EB65329B16817BE405CB365DB38DD81CF98
                                                                                                        APIs
                                                                                                        • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 00408A75
                                                                                                        • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408AE4
                                                                                                        • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408B7F
                                                                                                        • MessageBoxA.USER32(00000000,?,?,00002010), ref: 00408BBE
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: LoadString$FileMessageModuleName
                                                                                                        • String ID:
                                                                                                        • API String ID: 704749118-0
                                                                                                        • Opcode ID: ede814ba8b2c905ab74f80468cae56b5ab65d73ed59c96bbcc76a4520df8398d
                                                                                                        • Instruction ID: 7d65b0a5aa49ad722f3f3263bbe29e3330acee4661d9e2153cfe083702b22da2
                                                                                                        • Opcode Fuzzy Hash: ede814ba8b2c905ab74f80468cae56b5ab65d73ed59c96bbcc76a4520df8398d
                                                                                                        • Instruction Fuzzy Hash: 1F3123716083849AD370EB65C945BDF77D89B85704F40483FB6C8E72D1EB7859048B6B
                                                                                                        APIs
                                                                                                        • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044E90D
                                                                                                          • Part of subcall function 0044CF50: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044CF82
                                                                                                        • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044E991
                                                                                                          • Part of subcall function 0042BBB4: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042BBC8
                                                                                                        • IsRectEmpty.USER32(?), ref: 0044E953
                                                                                                        • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044E976
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                                                                                                        • String ID:
                                                                                                        • API String ID: 855768636-0
                                                                                                        • Opcode ID: a4575d285c62c1c56b7686ad69dfdc5ef60a631fed5d3d1fc0705a1474777ead
                                                                                                        • Instruction ID: f7bad605b8f68185b4e834990bb8ca2287257270a928060092b59a923d315d7c
                                                                                                        • Opcode Fuzzy Hash: a4575d285c62c1c56b7686ad69dfdc5ef60a631fed5d3d1fc0705a1474777ead
                                                                                                        • Instruction Fuzzy Hash: E5114A71B0030067E650BA7B8C86B5B76C9AB88748F15083FB545EB387DE7DDD094299
                                                                                                        APIs
                                                                                                        • OffsetRect.USER32(?,?,00000000), ref: 00495988
                                                                                                        • OffsetRect.USER32(?,00000000,?), ref: 004959A3
                                                                                                        • OffsetRect.USER32(?,?,00000000), ref: 004959BD
                                                                                                        • OffsetRect.USER32(?,00000000,?), ref: 004959D8
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: OffsetRect
                                                                                                        • String ID:
                                                                                                        • API String ID: 177026234-0
                                                                                                        • Opcode ID: e6cd63ab1267e2bef36e0ea42f4f89ffcc49fa5b03609306a0fb63f812f5ac90
                                                                                                        • Instruction ID: 9409249b62c1188f54b5b62e2685c04785358b71117f53a2337039625fc08c68
                                                                                                        • Opcode Fuzzy Hash: e6cd63ab1267e2bef36e0ea42f4f89ffcc49fa5b03609306a0fb63f812f5ac90
                                                                                                        • Instruction Fuzzy Hash: 1121AEB6700701AFDB00DE69CD81E5BB7DAEFC4350F248A2AF944C3249D638ED048761
                                                                                                        APIs
                                                                                                        • GetCursorPos.USER32 ref: 00417260
                                                                                                        • SetCursor.USER32(00000000), ref: 004172A3
                                                                                                        • GetLastActivePopup.USER32(?), ref: 004172CD
                                                                                                        • GetForegroundWindow.USER32(?), ref: 004172D4
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Cursor$ActiveForegroundLastPopupWindow
                                                                                                        • String ID:
                                                                                                        • API String ID: 1959210111-0
                                                                                                        • Opcode ID: 0325eb73ca892009698aa7541b5e3073a06fcfb7bd7d3fb361e05756697ccdec
                                                                                                        • Instruction ID: de3f0dc6b436800086b9427ec8ddd2ec86eeedce3a35093462374e80c8eda50e
                                                                                                        • Opcode Fuzzy Hash: 0325eb73ca892009698aa7541b5e3073a06fcfb7bd7d3fb361e05756697ccdec
                                                                                                        • Instruction Fuzzy Hash: C52183313086118AD720AFA9E945AE733F1EF44754B0544ABF8558B352DB3DDC82CB9E
                                                                                                        APIs
                                                                                                        • MulDiv.KERNEL32(?,00000008,?), ref: 004955F1
                                                                                                        • MulDiv.KERNEL32(?,00000008,?), ref: 00495605
                                                                                                        • MulDiv.KERNEL32(?,00000008,?), ref: 00495619
                                                                                                        • MulDiv.KERNEL32(?,00000008,?), ref: 00495637
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                                                                        • Instruction ID: b77f8f3c6746ea581d036ce488ab013aedd37a602364075716cddbfd1b85439e
                                                                                                        • Opcode Fuzzy Hash: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                                                                        • Instruction Fuzzy Hash: A5112E72604504ABCB40DEA9D8C4D9B7BECEF8D324B6441AAF908DB242D674ED408B68
                                                                                                        APIs
                                                                                                        • GetClassInfoA.USER32(00400000,0041F470,?), ref: 0041F4A1
                                                                                                        • UnregisterClassA.USER32(0041F470,00400000), ref: 0041F4CA
                                                                                                        • RegisterClassA.USER32(00499598), ref: 0041F4D4
                                                                                                        • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F50F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Class$InfoLongRegisterUnregisterWindow
                                                                                                        • String ID:
                                                                                                        • API String ID: 4025006896-0
                                                                                                        • Opcode ID: 7a514111b6068dfbbdb04c48d1a2146d17cf63cab41d43eccfd0167b2dbd8d5c
                                                                                                        • Instruction ID: 7a0dc659497f48f9aad4428a0df7724adcaf244520b53866b591a9b3b5545ee4
                                                                                                        • Opcode Fuzzy Hash: 7a514111b6068dfbbdb04c48d1a2146d17cf63cab41d43eccfd0167b2dbd8d5c
                                                                                                        • Instruction Fuzzy Hash: F6011B72240104AADA10EBACED81E9B33999729314B11423BB615E72A2D6399C558BAC
                                                                                                        APIs
                                                                                                        • WaitForInputIdle.USER32(?,00000032), ref: 00454FA8
                                                                                                        • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00454FCA
                                                                                                        • GetExitCodeProcess.KERNEL32(?,?), ref: 00454FD9
                                                                                                        • CloseHandle.KERNEL32(?,00455006,00454FFF,?,?,?,00000000,?,?,004551DB,?,?,?,00000044,00000000,00000000), ref: 00454FF9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
                                                                                                        • String ID:
                                                                                                        • API String ID: 4071923889-0
                                                                                                        • Opcode ID: 8aa0dd6ec5a68f6f7641eb82506f7728cd0b20fc7582fe19e2ee2bc87ac6724f
                                                                                                        • Instruction ID: ea90b2abd28d60bbe0c33bbe6d7a83e36ef454db8471bda6b5c19e9a906557d9
                                                                                                        • Opcode Fuzzy Hash: 8aa0dd6ec5a68f6f7641eb82506f7728cd0b20fc7582fe19e2ee2bc87ac6724f
                                                                                                        • Instruction Fuzzy Hash: B9012D31A006097FEB1097AA8C02F6FBBECDF49764F610127F904D72C2C5788D409A78
                                                                                                        APIs
                                                                                                        • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D027
                                                                                                        • LoadResource.KERNEL32(00400000,72756F73,0040A7C8,00400000,00000001,00000000,?,0040CF84,00000000,?,00000000,?,?,0047CB58,0000000A,00000000), ref: 0040D041
                                                                                                        • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040A7C8,00400000,00000001,00000000,?,0040CF84,00000000,?,00000000,?,?,0047CB58), ref: 0040D05B
                                                                                                        • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040A7C8,00400000,00000001,00000000,?,0040CF84,00000000,?,00000000,?), ref: 0040D065
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Resource$FindLoadLockSizeof
                                                                                                        • String ID:
                                                                                                        • API String ID: 3473537107-0
                                                                                                        • Opcode ID: f701ce4f04cb0ebdd1143b5585c75acb70ffd029a82b31343d3be87257736b7b
                                                                                                        • Instruction ID: ce77ce8360aa458f47a01e9b0563465317cd85cc21d7bcd45488e041df035c61
                                                                                                        • Opcode Fuzzy Hash: f701ce4f04cb0ebdd1143b5585c75acb70ffd029a82b31343d3be87257736b7b
                                                                                                        • Instruction Fuzzy Hash: 49F04F726056046F9B14EE59A881D5B77ECDE88268310013AF908E7286DA38DD018B68
                                                                                                        APIs
                                                                                                        • VirtualAlloc.KERNEL32(?,00100000,00002000,00000004,)^,?,?,?,004018B4), ref: 00401566
                                                                                                        • VirtualAlloc.KERNEL32(?,?,00002000,00000004,?,00100000,00002000,00000004,)^,?,?,?,004018B4), ref: 0040158B
                                                                                                        • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00100000,00002000,00000004,)^,?,?,?,004018B4), ref: 004015B1
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Virtual$Alloc$Free
                                                                                                        • String ID: )^
                                                                                                        • API String ID: 3668210933-748976004
                                                                                                        • Opcode ID: 4da9ee4765cce6e6c7be3d7cc9adf05dad1d6bab5239e3db9b33b19d934b365d
                                                                                                        • Instruction ID: ed10fda1d5a177d2a0c43996bc0be7fa2989f050302610c9045c0a13ae1d279a
                                                                                                        • Opcode Fuzzy Hash: 4da9ee4765cce6e6c7be3d7cc9adf05dad1d6bab5239e3db9b33b19d934b365d
                                                                                                        • Instruction Fuzzy Hash: AFF0C8716403206AEB315A294C85F133AD4DBC5754F104075BE09FF3DAD6B8980082AC
                                                                                                        APIs
                                                                                                        • GetLastError.KERNEL32(?,00000000), ref: 004705F1
                                                                                                        Strings
                                                                                                        • Setting NTFS compression on file: %s, xrefs: 004705BF
                                                                                                        • Unsetting NTFS compression on file: %s, xrefs: 004705D7
                                                                                                        • Failed to set NTFS compression state (%d)., xrefs: 00470602
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast
                                                                                                        • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
                                                                                                        • API String ID: 1452528299-3038984924
                                                                                                        • Opcode ID: 4a85a403c5f553919e8eb8264edf58c674aea38054a880eb2495f4adb197a451
                                                                                                        • Instruction ID: 452327faed6fd823952186a677ff1a78a18aba12ee86070aec797b5412e08bdc
                                                                                                        • Opcode Fuzzy Hash: 4a85a403c5f553919e8eb8264edf58c674aea38054a880eb2495f4adb197a451
                                                                                                        • Instruction Fuzzy Hash: A5018B71D09248A6CB04D7AD94512DDBBE49F4D314F44C5FFE459D7342DB780A088B9E
                                                                                                        APIs
                                                                                                        • GetLastError.KERNEL32(00000000,00000000), ref: 0046FE45
                                                                                                        Strings
                                                                                                        • Setting NTFS compression on directory: %s, xrefs: 0046FE13
                                                                                                        • Unsetting NTFS compression on directory: %s, xrefs: 0046FE2B
                                                                                                        • Failed to set NTFS compression state (%d)., xrefs: 0046FE56
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast
                                                                                                        • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
                                                                                                        • API String ID: 1452528299-1392080489
                                                                                                        • Opcode ID: 01501a136b81c39b7c411191948b84cc59583678e1d21d505a98b8108a1a9e37
                                                                                                        • Instruction ID: 6c3eba688a3488f6cff2036d9eec8e6f632fba0cce39d579df3f4bd3b957a0ce
                                                                                                        • Opcode Fuzzy Hash: 01501a136b81c39b7c411191948b84cc59583678e1d21d505a98b8108a1a9e37
                                                                                                        • Instruction Fuzzy Hash: E5014421E0824856CB04D7ADE44129DBBA49F49304F4485BBA495E7253EB790A09879B
                                                                                                        APIs
                                                                                                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                                        • RegDeleteValueA.ADVAPI32(?,00000000,00000082,00000002,00000000,?,?,00000000,0045B7AE,?,?,?,?,?,00000000,0045B7D5), ref: 00455DD8
                                                                                                        • RegCloseKey.ADVAPI32(00000000,?,00000000,00000082,00000002,00000000,?,?,00000000,0045B7AE,?,?,?,?,?,00000000), ref: 00455DE1
                                                                                                        • RemoveFontResourceA.GDI32(00000000), ref: 00455DEE
                                                                                                        • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00455E02
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
                                                                                                        • String ID:
                                                                                                        • API String ID: 4283692357-0
                                                                                                        • Opcode ID: 53be27aa0997865f395f34354d63af882f7726c3d4a8d794711f16c86898bbe7
                                                                                                        • Instruction ID: 71ccc6c4ad223293e5fa71c014565a1ca4f3f808124b73c5b0663eb55104ffd2
                                                                                                        • Opcode Fuzzy Hash: 53be27aa0997865f395f34354d63af882f7726c3d4a8d794711f16c86898bbe7
                                                                                                        • Instruction Fuzzy Hash: 57F0BEB174070036EA10B6BAAC4BF2B26CC8F54745F10883ABA00EF2C3D97CDC04962D
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$CountSleepTick
                                                                                                        • String ID:
                                                                                                        • API String ID: 2227064392-0
                                                                                                        • Opcode ID: dfa0650b41a5fbb69b4da717be5ba207ba5450cdb50d9376c11a56b5a3797e8a
                                                                                                        • Instruction ID: 56d8cd0ebf6ab4a4d31aad6ab38b951dee0ff9c0bbbb70c30f4e079d31b44593
                                                                                                        • Opcode Fuzzy Hash: dfa0650b41a5fbb69b4da717be5ba207ba5450cdb50d9376c11a56b5a3797e8a
                                                                                                        • Instruction Fuzzy Hash: C6E0ED6A30921149863131AE98CA6AF4D48CBC2324B28853FE08CE6283C89C4C0A867E
                                                                                                        APIs
                                                                                                        • GetCurrentProcess.KERNEL32(00000008,?,?,?,00000001,00000000,00000002,00000000,004812C8,?,?,?,?,?,00498CDB,00000000), ref: 0047820D
                                                                                                        • OpenProcessToken.ADVAPI32(00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,004812C8,?,?,?,?,?,00498CDB), ref: 00478213
                                                                                                        • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,004812C8), ref: 00478235
                                                                                                        • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,004812C8), ref: 00478246
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                                                                        • String ID:
                                                                                                        • API String ID: 215268677-0
                                                                                                        • Opcode ID: 89672e1c1dad377db11468aaf314ccfc00159a4e206af17bba33db1213e8e157
                                                                                                        • Instruction ID: 91f0679cb69370e855683a510bc75a037ced8834772831ea40795c83ba0b1c60
                                                                                                        • Opcode Fuzzy Hash: 89672e1c1dad377db11468aaf314ccfc00159a4e206af17bba33db1213e8e157
                                                                                                        • Instruction Fuzzy Hash: D8F037716447007BD600E6B58C81E5B73DCEB44354F04493E7E98C71C1DA78DC089776
                                                                                                        APIs
                                                                                                        • GetLastActivePopup.USER32(?), ref: 0042424C
                                                                                                        • IsWindowVisible.USER32(?), ref: 0042425D
                                                                                                        • IsWindowEnabled.USER32(?), ref: 00424267
                                                                                                        • SetForegroundWindow.USER32(?), ref: 00424271
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                                                                                        • String ID:
                                                                                                        • API String ID: 2280970139-0
                                                                                                        • Opcode ID: d317456c615bf9008b67529b06aff5f9fae4f5f479d94640f2b11ca0dbd6cbb7
                                                                                                        • Instruction ID: 2c5ff33fc315f6eb6fab431e1453bcb0e66c5aaaa6596e28cc8dc28fd0b03a53
                                                                                                        • Opcode Fuzzy Hash: d317456c615bf9008b67529b06aff5f9fae4f5f479d94640f2b11ca0dbd6cbb7
                                                                                                        • Instruction Fuzzy Hash: C7E0EC61B02672D6AE31FA7B2881A9F518C9D45BE434641EBBC04FB38ADB2CDC1141BD
                                                                                                        APIs
                                                                                                        • GlobalHandle.KERNEL32 ref: 0040626F
                                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00406276
                                                                                                        • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 0040627B
                                                                                                        • GlobalLock.KERNEL32(00000000), ref: 00406281
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Global$AllocHandleLockUnlock
                                                                                                        • String ID:
                                                                                                        • API String ID: 2167344118-0
                                                                                                        • Opcode ID: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
                                                                                                        • Instruction ID: 5df08fd8dc2b017785a639aa93036e57be915985ffe03f20f856cac12e18577c
                                                                                                        • Opcode Fuzzy Hash: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
                                                                                                        • Instruction Fuzzy Hash: 0BB009C4810A01BEEC0473B24C0BE3F245CD88172C3904A6F3448BA183987C9C405A3A
                                                                                                        APIs
                                                                                                        • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,0047BB01,?,00000000,00000000,00000001,00000000,0047A4B5,?,00000000), ref: 0047A479
                                                                                                        Strings
                                                                                                        • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 0047A2ED
                                                                                                        • Failed to parse "reg" constant, xrefs: 0047A480
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Close
                                                                                                        • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant
                                                                                                        • API String ID: 3535843008-1938159461
                                                                                                        • Opcode ID: 05ee6b3b67afee6859f894b9066335fb286a048b1f35c691c8bdca609618c678
                                                                                                        • Instruction ID: 25f2a786541cb687838a6194ffc4a73185deb9e5551b5ad8c851c0bf1152322b
                                                                                                        • Opcode Fuzzy Hash: 05ee6b3b67afee6859f894b9066335fb286a048b1f35c691c8bdca609618c678
                                                                                                        • Instruction Fuzzy Hash: 22817274E00108AFCB10DF95D485ADEBBF9AF88344F50817AE814B7392D739AE05CB99
                                                                                                        APIs
                                                                                                        • GetForegroundWindow.USER32(00000000,00483716,?,00000000,00483757,?,?,?,?,00000000,00000000,00000000,?,0046BD99), ref: 004835C5
                                                                                                        • SetActiveWindow.USER32(?,00000000,00483716,?,00000000,00483757,?,?,?,?,00000000,00000000,00000000,?,0046BD99), ref: 004835D7
                                                                                                        Strings
                                                                                                        • Will not restart Windows automatically., xrefs: 004836F6
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Window$ActiveForeground
                                                                                                        • String ID: Will not restart Windows automatically.
                                                                                                        • API String ID: 307657957-4169339592
                                                                                                        • Opcode ID: ceb5e1da4dc76295146827fa9bc1951038eb8722099578625e3d3877b71a3664
                                                                                                        • Instruction ID: 4bdce942002d158aae482430f0c171f92fa141a3e9c551c877f01fd154286bbb
                                                                                                        • Opcode Fuzzy Hash: ceb5e1da4dc76295146827fa9bc1951038eb8722099578625e3d3877b71a3664
                                                                                                        • Instruction Fuzzy Hash: 7F414870648240BFD321FF68DC92B6D3BE49718B09F6448B7E440573A2E37D9A059B1D
                                                                                                        APIs
                                                                                                        • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,004021FC), ref: 004020CB
                                                                                                          • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,022B8014,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                                                          • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,022B8014,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                                                          • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,022B8014,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                                                          • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,022B8014,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                                                                                                        • String ID: (^
                                                                                                        • API String ID: 296031713-2855655325
                                                                                                        • Opcode ID: f7415a2c64eb69b5f99dd9f286a1c89547b8feb56fb3c065f0e8b1d1766084a0
                                                                                                        • Instruction ID: 30adadd309813d1a6846ca6b4958dbaac508113c784b73a5bb8d11bfdb372a30
                                                                                                        • Opcode Fuzzy Hash: f7415a2c64eb69b5f99dd9f286a1c89547b8feb56fb3c065f0e8b1d1766084a0
                                                                                                        • Instruction Fuzzy Hash: 3941E3B2E00304DFDB10CF69EE8521A77A4F7A8324B15417FD854A77E2D3789801DB88
                                                                                                        APIs
                                                                                                        • LocalFileTimeToFileTime.KERNEL32(?,?,?,00000000,00000000,004764DF,?,00000000,004764F0,?,00000000,00476539), ref: 004764B0
                                                                                                        • SetFileTime.KERNEL32(?,00000000,00000000,?,?,?,?,00000000,00000000,004764DF,?,00000000,004764F0,?,00000000,00476539), ref: 004764C4
                                                                                                        Strings
                                                                                                        • Extracting temporary file: , xrefs: 004763EC
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FileTime$Local
                                                                                                        • String ID: Extracting temporary file:
                                                                                                        • API String ID: 791338737-4171118009
                                                                                                        • Opcode ID: a80e35328548893b295efc7472ac722154afa94c34651c27e26e6e8334cb8313
                                                                                                        • Instruction ID: 173659db1c42fed311bbc77dc24fc0b62308bfde4479aaaaa113f8cb774a82d8
                                                                                                        • Opcode Fuzzy Hash: a80e35328548893b295efc7472ac722154afa94c34651c27e26e6e8334cb8313
                                                                                                        • Instruction Fuzzy Hash: 9541B670E00649AFCB01DFA5C892AAFBBB9EB09704F51847AF814A7291D7789905CB58
                                                                                                        Strings
                                                                                                        • Failed to proceed to next wizard page; showing wizard., xrefs: 0046CD38
                                                                                                        • Failed to proceed to next wizard page; aborting., xrefs: 0046CD24
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                                                                                                        • API String ID: 0-1974262853
                                                                                                        • Opcode ID: 7a25e1645a33cbe6e929f5c7beb1038c0aed19b3e354743701339651447d5c4b
                                                                                                        • Instruction ID: bcb3787111d781b294161d03010f6e791927551fc3c7e501f8e48cd77162cd73
                                                                                                        • Opcode Fuzzy Hash: 7a25e1645a33cbe6e929f5c7beb1038c0aed19b3e354743701339651447d5c4b
                                                                                                        • Instruction Fuzzy Hash: A531C430604204DFD711EB59D9C5BA977F5EB06304F5500BBF448AB392D7786E40CB49
                                                                                                        APIs
                                                                                                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                                        • RegCloseKey.ADVAPI32(?,00478F7E,?,?,00000001,00000000,00000000,00478F99), ref: 00478F67
                                                                                                        Strings
                                                                                                        • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00478EF2
                                                                                                        • %s\%s_is1, xrefs: 00478F10
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseOpen
                                                                                                        • String ID: %s\%s_is1$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                                                        • API String ID: 47109696-1598650737
                                                                                                        • Opcode ID: 4390143081fa1cbfc05a77ab89ffad6b83c856e6c2d55465ffb8b64579313e9f
                                                                                                        • Instruction ID: 4b2a563bf9abf46f4fe3d7c32e0d4fce195dfbf5fea183d3e913b06dd9c9918d
                                                                                                        • Opcode Fuzzy Hash: 4390143081fa1cbfc05a77ab89ffad6b83c856e6c2d55465ffb8b64579313e9f
                                                                                                        • Instruction Fuzzy Hash: EC218070B44244AFDB11DBA9CC45A9EBBF9EB8D704F90847BE408E7381DB789D018B58
                                                                                                        APIs
                                                                                                        • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 004501FD
                                                                                                        • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 0045022E
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ExecuteMessageSendShell
                                                                                                        • String ID: open
                                                                                                        • API String ID: 812272486-2758837156
                                                                                                        • Opcode ID: ea446b968c091deb5619fe0c64f284e9fafe3e6cb185d1fb8701354efc215884
                                                                                                        • Instruction ID: 7f57506e0c07b49dd0b520b237e7736b759e9f4ed638734fb0c833ac5abbff07
                                                                                                        • Opcode Fuzzy Hash: ea446b968c091deb5619fe0c64f284e9fafe3e6cb185d1fb8701354efc215884
                                                                                                        • Instruction Fuzzy Hash: A1216074E00204AFDB10DFA9C896B9EBBF8EB44705F1081BAB404E7292D678DE45CA59
                                                                                                        APIs
                                                                                                        • ShellExecuteEx.SHELL32(0000003C), ref: 0045532C
                                                                                                        • GetLastError.KERNEL32(0000003C,00000000,00455375,?,?,?), ref: 0045533D
                                                                                                          • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: DirectoryErrorExecuteLastShellSystem
                                                                                                        • String ID: <
                                                                                                        • API String ID: 893404051-4251816714
                                                                                                        • Opcode ID: be62181711fdad770c23067a055a605ead6c89444dc6de91f0ff3b7559ccb240
                                                                                                        • Instruction ID: 92df0b2f1231c5c49ece4c570041ef31d6ed92e86db86b93cafb864a5026e18c
                                                                                                        • Opcode Fuzzy Hash: be62181711fdad770c23067a055a605ead6c89444dc6de91f0ff3b7559ccb240
                                                                                                        • Instruction Fuzzy Hash: 172167B0600609ABDB10EF65C8926AE7BE8AF44355F54403AFC44E7291D7789E49CB98
                                                                                                        APIs
                                                                                                        • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,)), ref: 004025C7
                                                                                                        • RtlLeaveCriticalSection.KERNEL32(0049B420,0040263D), ref: 00402630
                                                                                                          • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,022B8014,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                                                          • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,022B8014,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                                                          • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,022B8014,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                                                          • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,022B8014,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                                                                                        • String ID: )
                                                                                                        • API String ID: 2227675388-1084416617
                                                                                                        • Opcode ID: 09cf32ac568926239da630a480ec85c7fe0e44c3c7351229851fbcf18ccaddb2
                                                                                                        • Instruction ID: 77bd95ba853a3ee3b707a504883d316aad751082ca23ba06a0d8aa2ba3da16af
                                                                                                        • Opcode Fuzzy Hash: 09cf32ac568926239da630a480ec85c7fe0e44c3c7351229851fbcf18ccaddb2
                                                                                                        • Instruction Fuzzy Hash: E11104317042046FEB15AB796F5962B6AD4D795758B24087FF404F33D2DABD8C02929C
                                                                                                        APIs
                                                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 00496B69
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Window
                                                                                                        • String ID: /INITPROCWND=$%x $@
                                                                                                        • API String ID: 2353593579-4169826103
                                                                                                        • Opcode ID: 065ab22c92abacbd348a857e8389b224364e1a84b4d72130b6d36c29b0d142f9
                                                                                                        • Instruction ID: 88b10d18150c6b9811cea3f3864e76c9cf3cbfb68c265b437af87b1fefc14b87
                                                                                                        • Opcode Fuzzy Hash: 065ab22c92abacbd348a857e8389b224364e1a84b4d72130b6d36c29b0d142f9
                                                                                                        • Instruction Fuzzy Hash: A3117231A042489FDF01DBA4E855BAEBFE8EB49314F51847BE504E7292EB3CA905C658
                                                                                                        APIs
                                                                                                          • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                                          • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                                        • SysFreeString.OLEAUT32(?), ref: 004474C6
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: String$AllocByteCharFreeMultiWide
                                                                                                        • String ID: NIL Interface Exception$Unknown Method
                                                                                                        • API String ID: 3952431833-1023667238
                                                                                                        • Opcode ID: eaaa5532a95bbaa63f0b72a9291e33775e11d622c6162567185e6fee38e986d8
                                                                                                        • Instruction ID: eb0132878ffe7144b3db707554455947565e11d0cdd4dc78092451a8fec87e99
                                                                                                        • Opcode Fuzzy Hash: eaaa5532a95bbaa63f0b72a9291e33775e11d622c6162567185e6fee38e986d8
                                                                                                        • Instruction Fuzzy Hash: 8011B9706082089FEB10DFA58C52A6EBBBCEB09704F91407AF504F7681D77C9D01CB69
                                                                                                        APIs
                                                                                                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00496468,?,0049645C,00000000,00496443), ref: 0049640E
                                                                                                        • CloseHandle.KERNEL32(004964A8,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00496468,?,0049645C,00000000), ref: 00496425
                                                                                                          • Part of subcall function 004962F8: GetLastError.KERNEL32(00000000,00496390,?,?,?,?), ref: 0049631C
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseCreateErrorHandleLastProcess
                                                                                                        • String ID: 0nI
                                                                                                        • API String ID: 3798668922-794067871
                                                                                                        • Opcode ID: 9f8f3e3bd8d813766f30c87d8e8bb38219208be6823d56de1360ae23e0f090d4
                                                                                                        • Instruction ID: 4379268ebcebee96409867e54b2437a6ba0b21f89d1dc4ba20584320bf55fb87
                                                                                                        • Opcode Fuzzy Hash: 9f8f3e3bd8d813766f30c87d8e8bb38219208be6823d56de1360ae23e0f090d4
                                                                                                        • Instruction Fuzzy Hash: 840182B1644248AFDB00EBD1DC42A9EBBACDF08704F51403AB904E7281D6785E008A2D
                                                                                                        APIs
                                                                                                        • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042DD78
                                                                                                        • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042DDB8
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Value$EnumQuery
                                                                                                        • String ID: Inno Setup: No Icons
                                                                                                        • API String ID: 1576479698-2016326496
                                                                                                        • Opcode ID: 36a0b08f46d91d09f38f531e186592c2a543f82488f0210131226a48688c00be
                                                                                                        • Instruction ID: 8d080c6700cf8453afd411d185ff7d2dd707f59376968ad674d2e7d16536e1ed
                                                                                                        • Opcode Fuzzy Hash: 36a0b08f46d91d09f38f531e186592c2a543f82488f0210131226a48688c00be
                                                                                                        • Instruction Fuzzy Hash: 1B012B33B55B7179FB3045256D01F7B57889B82B60F64013BF942EA2C0D6999C04936E
                                                                                                        APIs
                                                                                                        • SetFileAttributesA.KERNEL32(00000000,?,00000000,00452EE9,?,?,-00000001,?), ref: 00452EC3
                                                                                                        • GetLastError.KERNEL32(00000000,?,00000000,00452EE9,?,?,-00000001,?), ref: 00452ECB
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AttributesErrorFileLast
                                                                                                        • String ID: T$H
                                                                                                        • API String ID: 1799206407-488339322
                                                                                                        • Opcode ID: 164a1123582fd7f8b9629d9128a54c78742dfc935cb603b92947040143095295
                                                                                                        • Instruction ID: d2ab7b9b66ca24062e77e49c95e81f13ab46b8af1b1b2eb811bbb53637dcbd2b
                                                                                                        • Opcode Fuzzy Hash: 164a1123582fd7f8b9629d9128a54c78742dfc935cb603b92947040143095295
                                                                                                        • Instruction Fuzzy Hash: 86F0F971A04204AB8B01DB7A9D4249EB7ECEB8A32171045BBFC04E3642E7B84E048558
                                                                                                        APIs
                                                                                                        • DeleteFileA.KERNEL32(00000000,00000000,00452965,?,-00000001,?), ref: 0045293F
                                                                                                        • GetLastError.KERNEL32(00000000,00000000,00452965,?,-00000001,?), ref: 00452947
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: DeleteErrorFileLast
                                                                                                        • String ID: T$H
                                                                                                        • API String ID: 2018770650-488339322
                                                                                                        • Opcode ID: 54a576a396afaa571a066345412aacc20c83a6c328a38e41dddb38150347ef46
                                                                                                        • Instruction ID: a1d21d86fbcf93c7076efe682877c1f84c37cf58088428800e153654eea74c02
                                                                                                        • Opcode Fuzzy Hash: 54a576a396afaa571a066345412aacc20c83a6c328a38e41dddb38150347ef46
                                                                                                        • Instruction Fuzzy Hash: 05F0C2B2B04608ABDB01EFB59D414AEB7E8EB4E315B6045B7FC04E3742E6B85E148598
                                                                                                        APIs
                                                                                                        • RemoveDirectoryA.KERNEL32(00000000,00000000,00452E6D,?,-00000001,00000000), ref: 00452E47
                                                                                                        • GetLastError.KERNEL32(00000000,00000000,00452E6D,?,-00000001,00000000), ref: 00452E4F
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: DirectoryErrorLastRemove
                                                                                                        • String ID: T$H
                                                                                                        • API String ID: 377330604-488339322
                                                                                                        • Opcode ID: f20199e737e539a63e7b44ed2747663bd9db8366f39d7150388d1a26e91210d5
                                                                                                        • Instruction ID: a8b2bafe79397aca91686f8656b478e2385adfe3b855dfce5f6cc0b9ba314abc
                                                                                                        • Opcode Fuzzy Hash: f20199e737e539a63e7b44ed2747663bd9db8366f39d7150388d1a26e91210d5
                                                                                                        • Instruction Fuzzy Hash: 70F0FC71A04708AFCF01EF759D4249EB7E8DB4E31575049B7FC14E3642E7785E048598
                                                                                                        APIs
                                                                                                          • Part of subcall function 0047D0CC: FreeLibrary.KERNEL32(74600000,00481A2F), ref: 0047D0E2
                                                                                                          • Part of subcall function 0047CD9C: GetTickCount.KERNEL32 ref: 0047CDE6
                                                                                                          • Part of subcall function 00457294: SendMessageA.USER32(00000000,00000B01,00000000,00000000), ref: 004572B3
                                                                                                        • GetCurrentProcess.KERNEL32(00000001,?,?,?,?,0049895B), ref: 00498059
                                                                                                        • TerminateProcess.KERNEL32(00000000,00000001,?,?,?,?,0049895B), ref: 0049805F
                                                                                                        Strings
                                                                                                        • Detected restart. Removing temporary directory., xrefs: 00498013
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Process$CountCurrentFreeLibraryMessageSendTerminateTick
                                                                                                        • String ID: Detected restart. Removing temporary directory.
                                                                                                        • API String ID: 1717587489-3199836293
                                                                                                        • Opcode ID: 281135f9a0ad5b4e488772808dcd9eaa6bf3b34c39f962a9f46887a4a11e3304
                                                                                                        • Instruction ID: bb05712aa7eb36d303e19ffab6eef2c78f2a463723ea7eca767f41585c441369
                                                                                                        • Opcode Fuzzy Hash: 281135f9a0ad5b4e488772808dcd9eaa6bf3b34c39f962a9f46887a4a11e3304
                                                                                                        • Instruction Fuzzy Hash: BDE0E532208A406DDA1177BABC1396B7F5CDB46768B22487FF50882552D92D481CC53D
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.3289491935.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.3289436336.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289691062.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289716851.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289742049.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                        • Associated: 00000001.00000002.3289764077.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_GEm3o8pION.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLastSleep
                                                                                                        • String ID:
                                                                                                        • API String ID: 1458359878-0
                                                                                                        • Opcode ID: 1a9f46df8411143c40a07a37eb8806f02fdea1552ea3146ec5e635b784cd6770
                                                                                                        • Instruction ID: f31041694d7e6b08a2ea33ec2b58b28b25921f40701f973673b956735a8b67d8
                                                                                                        • Opcode Fuzzy Hash: 1a9f46df8411143c40a07a37eb8806f02fdea1552ea3146ec5e635b784cd6770
                                                                                                        • Instruction Fuzzy Hash: 42F02B32705F58A78B21B56A889157FB2A8DB81366750012BFC0CD7313C878CC058BBC

                                                                                                        Execution Graph

                                                                                                        Execution Coverage:2.5%
                                                                                                        Dynamic/Decrypted Code Coverage:66.5%
                                                                                                        Signature Coverage:17.4%
                                                                                                        Total number of Nodes:478
                                                                                                        Total number of Limit Nodes:25
                                                                                                        execution_graph 60994 402a20 GetVersion 61018 403b64 HeapCreate 60994->61018 60996 402a7f 60997 402a84 60996->60997 60998 402a8c 60996->60998 61093 402b3b 8 API calls 60997->61093 61030 403844 60998->61030 61002 402a94 GetCommandLineA 61044 403712 61002->61044 61006 402aae 61076 40340c 61006->61076 61008 402ab3 61009 402ab8 GetStartupInfoA 61008->61009 61089 4033b4 61009->61089 61011 402aca GetModuleHandleA 61013 402aee 61011->61013 61094 40315b GetCurrentProcess TerminateProcess ExitProcess 61013->61094 61015 402af7 61095 403230 UnhandledExceptionFilter 61015->61095 61017 402b08 61019 403b84 61018->61019 61020 403bba 61018->61020 61096 403a1c 19 API calls 61019->61096 61020->60996 61022 403b89 61023 403b93 61022->61023 61025 403ba0 61022->61025 61097 403f3b HeapAlloc 61023->61097 61026 403bbd 61025->61026 61098 40478c HeapAlloc VirtualAlloc VirtualAlloc VirtualFree HeapFree 61025->61098 61026->60996 61027 403b9d 61027->61026 61029 403bae HeapDestroy 61027->61029 61029->61020 61099 402b5f 61030->61099 61033 403863 GetStartupInfoA 61036 4038af 61033->61036 61037 403974 61033->61037 61036->61037 61040 402b5f 12 API calls 61036->61040 61042 403920 61036->61042 61038 4039db SetHandleCount 61037->61038 61039 40399b GetStdHandle 61037->61039 61038->61002 61039->61037 61041 4039a9 GetFileType 61039->61041 61040->61036 61041->61037 61042->61037 61043 403942 GetFileType 61042->61043 61043->61042 61045 403760 61044->61045 61046 40372d GetEnvironmentStringsW 61044->61046 61047 403735 61045->61047 61050 403751 61045->61050 61046->61047 61048 403741 GetEnvironmentStrings 61046->61048 61051 403779 WideCharToMultiByte 61047->61051 61052 40376d GetEnvironmentStringsW 61047->61052 61049 402aa4 61048->61049 61048->61050 61067 4034c5 61049->61067 61050->61049 61053 4037f3 GetEnvironmentStrings 61050->61053 61054 4037ff 61050->61054 61056 4037ad 61051->61056 61057 4037df FreeEnvironmentStringsW 61051->61057 61052->61049 61052->61051 61053->61049 61053->61054 61058 402b5f 12 API calls 61054->61058 61059 402b5f 12 API calls 61056->61059 61057->61049 61065 40381a 61058->61065 61060 4037b3 61059->61060 61060->61057 61061 4037bc WideCharToMultiByte 61060->61061 61063 4037d6 61061->61063 61064 4037cd 61061->61064 61062 403830 FreeEnvironmentStringsA 61062->61049 61063->61057 61108 402c11 61064->61108 61065->61062 61068 4034d7 61067->61068 61069 4034dc GetModuleFileNameA 61067->61069 61121 405d24 19 API calls 61068->61121 61071 4034ff 61069->61071 61072 402b5f 12 API calls 61071->61072 61073 403520 61072->61073 61074 403530 61073->61074 61122 402b16 7 API calls 61073->61122 61074->61006 61077 403419 61076->61077 61079 40341e 61076->61079 61123 405d24 19 API calls 61077->61123 61080 402b5f 12 API calls 61079->61080 61081 40344b 61080->61081 61088 40345f 61081->61088 61124 402b16 7 API calls 61081->61124 61083 4034a2 61084 402c11 7 API calls 61083->61084 61085 4034ae 61084->61085 61085->61008 61086 402b5f 12 API calls 61086->61088 61088->61083 61088->61086 61125 402b16 7 API calls 61088->61125 61090 4033bd 61089->61090 61092 4033c2 61089->61092 61126 405d24 19 API calls 61090->61126 61092->61011 61094->61015 61095->61017 61096->61022 61097->61027 61098->61027 61103 402b71 61099->61103 61102 402b16 7 API calls 61102->61033 61104 402b78 61103->61104 61105 402b6e 61103->61105 61104->61105 61107 402b9d 12 API calls 61104->61107 61105->61033 61105->61102 61107->61104 61109 402c39 61108->61109 61110 402c1d 61108->61110 61109->61063 61111 402c27 61110->61111 61112 402c3d 61110->61112 61114 402c69 HeapFree 61111->61114 61115 402c33 61111->61115 61113 402c68 61112->61113 61117 402c57 61112->61117 61113->61114 61114->61109 61119 403fae VirtualFree VirtualFree HeapFree 61115->61119 61120 404a3f VirtualFree HeapFree VirtualFree 61117->61120 61119->61109 61120->61109 61121->61069 61122->61074 61123->61079 61124->61088 61125->61088 61126->61092 61127 2c7e9a6 LoadLibraryA 61128 2c7e9cf GetProcAddress 61127->61128 61129 2c7ea89 61127->61129 61130 2c7ea82 FreeLibrary 61128->61130 61133 2c7e9e3 61128->61133 61130->61129 61131 2c7e9f5 GetAdaptersInfo 61131->61133 61132 2c7ea7d 61132->61130 61133->61131 61133->61132 61135 2c827b5 61133->61135 61137 2c827bd 61135->61137 61138 2c827d7 61137->61138 61140 2c827db std::exception::exception 61137->61140 61143 2c81fac 61137->61143 61160 2c86e63 RtlDecodePointer 61137->61160 61138->61133 61161 2c831ba RaiseException 61140->61161 61142 2c82805 61144 2c82027 61143->61144 61158 2c81fb8 61143->61158 61168 2c86e63 RtlDecodePointer 61144->61168 61146 2c8202d 61169 2c84abb 59 API calls __getptd_noexit 61146->61169 61147 2c81fc3 61147->61158 61162 2c87281 59 API calls 2 library calls 61147->61162 61163 2c872de 59 API calls 8 library calls 61147->61163 61164 2c86eca GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 61147->61164 61150 2c81feb RtlAllocateHeap 61152 2c8201f 61150->61152 61150->61158 61152->61137 61153 2c82013 61166 2c84abb 59 API calls __getptd_noexit 61153->61166 61157 2c82011 61167 2c84abb 59 API calls __getptd_noexit 61157->61167 61158->61147 61158->61150 61158->61153 61158->61157 61165 2c86e63 RtlDecodePointer 61158->61165 61160->61137 61161->61142 61162->61147 61163->61147 61165->61158 61166->61157 61167->61152 61168->61146 61169->61152 61170 40d222 61171 40d4ee CloseServiceHandle CloseServiceHandle 61170->61171 61173 40d252 61171->61173 61174 40e053 61173->61174 61175 40d465 CopyFileA 61173->61175 61175->61173 61176 40d2a5 61177 40d2aa 61176->61177 61178 401c5c 61176->61178 61179 40d448 LoadLibraryExA 61178->61179 61180 40dca5 61178->61180 61179->61178 61181 4019a7 61182 402276 OpenSCManagerA 61181->61182 61183 40dfdc 61182->61183 61184 4021a7 RegOpenKeyExA 61185 402160 61184->61185 61186 401f88 61187 401f94 RegSetValueExA 61186->61187 61188 401d89 RegQueryValueExA 61189 40d9e2 61188->61189 61190 40166a lstrcmpiW 61191 401c69 61190->61191 61192 2c7104d 61197 2c823a4 61192->61197 61203 2c822a8 61197->61203 61199 2c71057 61200 2c71aa9 InterlockedIncrement 61199->61200 61201 2c71ac5 WSAStartup InterlockedExchange 61200->61201 61202 2c7105c 61200->61202 61201->61202 61204 2c822b4 __CRT_INIT@12 61203->61204 61211 2c87140 61204->61211 61210 2c822db __CRT_INIT@12 61210->61199 61228 2c8749b 61211->61228 61213 2c822bd 61214 2c822ec RtlDecodePointer RtlDecodePointer 61213->61214 61215 2c82319 61214->61215 61216 2c822c9 61214->61216 61215->61216 61237 2c87d0d 60 API calls __cftoa_l 61215->61237 61225 2c822e6 61216->61225 61218 2c8237c RtlEncodePointer RtlEncodePointer 61218->61216 61219 2c8232b 61219->61218 61220 2c82350 61219->61220 61238 2c876a9 62 API calls 2 library calls 61219->61238 61220->61216 61223 2c8236a RtlEncodePointer 61220->61223 61239 2c876a9 62 API calls 2 library calls 61220->61239 61223->61218 61224 2c82364 61224->61216 61224->61223 61240 2c87149 61225->61240 61229 2c874ac 61228->61229 61230 2c874bf RtlEnterCriticalSection 61228->61230 61235 2c87523 59 API calls 10 library calls 61229->61235 61230->61213 61232 2c874b2 61232->61230 61236 2c86fed 59 API calls 3 library calls 61232->61236 61235->61232 61237->61219 61238->61220 61239->61224 61243 2c87605 RtlLeaveCriticalSection 61240->61243 61242 2c822eb 61242->61210 61243->61242 61244 2cd5f07 61245 2d086f1 WriteFile 61244->61245 61246 40184c 61247 40d24c CopyFileA 61246->61247 61249 40d252 61247->61249 61248 40d465 CopyFileA 61248->61249 61249->61248 61250 40e053 61249->61250 61251 40244e 61252 40d9ef 61251->61252 61255 401649 61252->61255 61256 4018b3 VirtualAlloc 61255->61256 61258 40df6c GetModuleHandleA 61256->61258 61260 401870 RegCloseKey 61261 401876 61260->61261 61262 40d4e1 RegCreateKeyExA 61261->61262 61263 40e066 61261->61263 61262->61261 61264 401c52 61265 40d4c8 61264->61265 61268 401301 FindResourceA 61265->61268 61267 40d4cd 61269 401367 SizeofResource 61268->61269 61274 401360 61268->61274 61270 401386 LoadResource LockResource GlobalAlloc 61269->61270 61269->61274 61271 4013cc 61270->61271 61272 40141f GetTickCount 61271->61272 61275 40142a GlobalAlloc 61272->61275 61274->61267 61275->61274 61276 40d614 61277 40df4e Sleep 61276->61277 61278 40df54 61277->61278 61278->61278 61279 402377 61280 40d5f7 CreateDirectoryA 61279->61280 61281 40de6b 61280->61281 61281->61281 61282 2cd4d35 61283 2cec8ac 61282->61283 61287 2c7e8a2 CreateFileA 61283->61287 61284 2cec8b1 61286 2c7e8a2 64 API calls 61284->61286 61286->61284 61288 2c7e99e 61287->61288 61290 2c7e8d3 61287->61290 61288->61284 61289 2c7e8eb DeviceIoControl 61289->61290 61290->61289 61291 2c7e994 CloseHandle 61290->61291 61292 2c7e960 GetLastError 61290->61292 61293 2c827b5 _Allocate 60 API calls 61290->61293 61291->61288 61292->61290 61292->61291 61293->61290 61294 40dcd9 RegCloseKey 61295 401ebb 61296 40d14a 61295->61296 61299 2c82978 61296->61299 61300 2c82981 61299->61300 61301 2c82986 61299->61301 61313 2c8917c GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 61300->61313 61305 2c8299b 61301->61305 61304 40d60a 61306 2c829a7 __CRT_INIT@12 61305->61306 61310 2c829f5 ___DllMainCRTStartup 61306->61310 61312 2c82a52 __CRT_INIT@12 61306->61312 61314 2c82806 61306->61314 61308 2c82a2f 61309 2c82806 __CRT_INIT@12 138 API calls 61308->61309 61308->61312 61309->61312 61310->61308 61311 2c82806 __CRT_INIT@12 138 API calls 61310->61311 61310->61312 61311->61308 61312->61304 61313->61301 61315 2c82812 __CRT_INIT@12 61314->61315 61316 2c8281a 61315->61316 61317 2c82894 61315->61317 61362 2c86e46 GetProcessHeap 61316->61362 61319 2c82898 61317->61319 61320 2c828fd 61317->61320 61324 2c828b9 61319->61324 61327 2c82823 __CRT_INIT@12 61319->61327 61451 2c87009 59 API calls _doexit 61319->61451 61322 2c82960 61320->61322 61323 2c82902 61320->61323 61321 2c8281f 61321->61327 61363 2c849f4 61321->61363 61322->61327 61482 2c84884 59 API calls 2 library calls 61322->61482 61456 2c87d7b 61323->61456 61452 2c86ee0 61 API calls _free 61324->61452 61327->61310 61331 2c8290d 61331->61327 61459 2c8761a 61331->61459 61332 2c828be 61344 2c828cf __CRT_INIT@12 61332->61344 61453 2c88e1a 60 API calls _free 61332->61453 61333 2c8282f __RTC_Initialize 61333->61327 61339 2c8283f GetCommandLineA 61333->61339 61338 2c828ca 61454 2c84a6a 62 API calls 2 library calls 61338->61454 61384 2c89218 GetEnvironmentStringsW 61339->61384 61343 2c82936 61346 2c8293c 61343->61346 61347 2c82954 61343->61347 61455 2c828e8 62 API calls __mtterm 61344->61455 61466 2c84941 61346->61466 61476 2c81f74 61347->61476 61351 2c82859 61353 2c8285d 61351->61353 61416 2c88e6c 61351->61416 61352 2c82944 GetCurrentThreadId 61352->61327 61449 2c84a6a 62 API calls 2 library calls 61353->61449 61357 2c8287d 61357->61327 61450 2c88e1a 60 API calls _free 61357->61450 61362->61321 61483 2c870b0 36 API calls 2 library calls 61363->61483 61365 2c849f9 61484 2c875cc InitializeCriticalSectionAndSpinCount ___lock_fhandle 61365->61484 61367 2c849fe 61368 2c84a02 61367->61368 61486 2c87d3e TlsAlloc 61367->61486 61485 2c84a6a 62 API calls 2 library calls 61368->61485 61371 2c84a07 61371->61333 61372 2c84a14 61372->61368 61373 2c84a1f 61372->61373 61374 2c8761a __calloc_crt 59 API calls 61373->61374 61375 2c84a2c 61374->61375 61376 2c84a61 61375->61376 61487 2c87d9a TlsSetValue 61375->61487 61488 2c84a6a 62 API calls 2 library calls 61376->61488 61379 2c84a40 61379->61376 61381 2c84a46 61379->61381 61380 2c84a66 61380->61333 61382 2c84941 __initptd 59 API calls 61381->61382 61383 2c84a4e GetCurrentThreadId 61382->61383 61383->61333 61385 2c8922b WideCharToMultiByte 61384->61385 61386 2c8284f 61384->61386 61388 2c8925e 61385->61388 61389 2c89295 FreeEnvironmentStringsW 61385->61389 61397 2c88b66 61386->61397 61489 2c87662 59 API calls 2 library calls 61388->61489 61389->61386 61391 2c89264 61391->61389 61392 2c8926b WideCharToMultiByte 61391->61392 61393 2c8928a FreeEnvironmentStringsW 61392->61393 61394 2c89281 61392->61394 61393->61386 61395 2c81f74 _free 59 API calls 61394->61395 61396 2c89287 61395->61396 61396->61393 61398 2c88b72 __CRT_INIT@12 61397->61398 61399 2c8749b __lock 59 API calls 61398->61399 61400 2c88b79 61399->61400 61401 2c8761a __calloc_crt 59 API calls 61400->61401 61402 2c88b8a 61401->61402 61403 2c88bf5 GetStartupInfoW 61402->61403 61404 2c88b95 @_EH4_CallFilterFunc@8 __CRT_INIT@12 61402->61404 61410 2c88c0a 61403->61410 61413 2c88d39 61403->61413 61404->61351 61405 2c88e01 61492 2c88e11 RtlLeaveCriticalSection _doexit 61405->61492 61407 2c8761a __calloc_crt 59 API calls 61407->61410 61408 2c88d86 GetStdHandle 61408->61413 61409 2c88d99 GetFileType 61409->61413 61410->61407 61411 2c88c58 61410->61411 61410->61413 61412 2c88c8c GetFileType 61411->61412 61411->61413 61490 2c87dbc InitializeCriticalSectionAndSpinCount 61411->61490 61412->61411 61413->61405 61413->61408 61413->61409 61491 2c87dbc InitializeCriticalSectionAndSpinCount 61413->61491 61417 2c88e7a 61416->61417 61418 2c88e7f GetModuleFileNameA 61416->61418 61499 2c83eea 71 API calls __setmbcp 61417->61499 61420 2c88eac 61418->61420 61493 2c88f1f 61420->61493 61422 2c82869 61422->61357 61427 2c8909b 61422->61427 61425 2c88ee5 61425->61422 61426 2c88f1f _parse_cmdline 59 API calls 61425->61426 61426->61422 61428 2c890a4 61427->61428 61431 2c890a9 _strlen 61427->61431 61503 2c83eea 71 API calls __setmbcp 61428->61503 61430 2c82872 61430->61357 61443 2c87018 61430->61443 61431->61430 61432 2c8761a __calloc_crt 59 API calls 61431->61432 61439 2c890df _strlen 61432->61439 61433 2c89131 61434 2c81f74 _free 59 API calls 61433->61434 61434->61430 61435 2c8761a __calloc_crt 59 API calls 61435->61439 61436 2c89158 61437 2c81f74 _free 59 API calls 61436->61437 61437->61430 61439->61430 61439->61433 61439->61435 61439->61436 61440 2c8916f 61439->61440 61504 2c8591c 59 API calls __cftoa_l 61439->61504 61505 2c83b65 8 API calls 2 library calls 61440->61505 61442 2c8917b 61444 2c87024 __IsNonwritableInCurrentImage 61443->61444 61506 2c8ab7f 61444->61506 61446 2c87042 __initterm_e 61447 2c823a4 __cinit 68 API calls 61446->61447 61448 2c87061 _doexit __IsNonwritableInCurrentImage 61446->61448 61447->61448 61448->61357 61449->61327 61450->61353 61451->61324 61452->61332 61453->61338 61454->61344 61455->61327 61457 2c87d8e 61456->61457 61458 2c87d92 TlsGetValue 61456->61458 61457->61331 61458->61331 61462 2c87621 61459->61462 61461 2c8291e 61461->61327 61465 2c87d9a TlsSetValue 61461->61465 61462->61461 61464 2c8763f 61462->61464 61509 2c8e9a8 61462->61509 61464->61461 61464->61462 61517 2c880b7 Sleep 61464->61517 61465->61343 61467 2c8494d __CRT_INIT@12 61466->61467 61468 2c8749b __lock 59 API calls 61467->61468 61469 2c8498a 61468->61469 61520 2c849e2 61469->61520 61472 2c8749b __lock 59 API calls 61473 2c849ab ___addlocaleref 61472->61473 61523 2c849eb 61473->61523 61475 2c849d6 __CRT_INIT@12 61475->61352 61477 2c81f7d HeapFree 61476->61477 61481 2c81fa6 __dosmaperr 61476->61481 61478 2c81f92 61477->61478 61477->61481 61528 2c84abb 59 API calls __getptd_noexit 61478->61528 61480 2c81f98 GetLastError 61480->61481 61481->61327 61482->61327 61483->61365 61484->61367 61485->61371 61486->61372 61487->61379 61488->61380 61489->61391 61490->61411 61491->61413 61492->61404 61495 2c88f41 61493->61495 61498 2c88fa5 61495->61498 61501 2c8ef86 59 API calls x_ismbbtype_l 61495->61501 61496 2c88ec2 61496->61422 61500 2c87662 59 API calls 2 library calls 61496->61500 61498->61496 61502 2c8ef86 59 API calls x_ismbbtype_l 61498->61502 61499->61418 61500->61425 61501->61495 61502->61498 61503->61431 61504->61439 61505->61442 61507 2c8ab82 RtlEncodePointer 61506->61507 61507->61507 61508 2c8ab9c 61507->61508 61508->61446 61510 2c8e9b3 61509->61510 61515 2c8e9ce 61509->61515 61511 2c8e9bf 61510->61511 61510->61515 61518 2c84abb 59 API calls __getptd_noexit 61511->61518 61513 2c8e9de RtlAllocateHeap 61513->61515 61516 2c8e9c4 61513->61516 61515->61513 61515->61516 61519 2c86e63 RtlDecodePointer 61515->61519 61516->61462 61517->61464 61518->61516 61519->61515 61526 2c87605 RtlLeaveCriticalSection 61520->61526 61522 2c849a4 61522->61472 61527 2c87605 RtlLeaveCriticalSection 61523->61527 61525 2c849f2 61525->61475 61526->61522 61527->61525 61528->61480 61529 40d15e 61530 40d3a2 lstrcmpiW 61529->61530 61532 2c75e59 RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 61602 2c742c7 61532->61602 61534 2c75ec6 GetTickCount 61535 2c759f4 59 API calls 61534->61535 61536 2c75ee3 GetVersionExA 61535->61536 61537 2c75f24 _memset 61536->61537 61538 2c81fac _malloc 59 API calls 61537->61538 61539 2c75f31 61538->61539 61540 2c81fac _malloc 59 API calls 61539->61540 61541 2c75f41 61540->61541 61542 2c81fac _malloc 59 API calls 61541->61542 61543 2c75f4c 61542->61543 61544 2c81fac _malloc 59 API calls 61543->61544 61545 2c75f57 61544->61545 61546 2c81fac _malloc 59 API calls 61545->61546 61547 2c75f62 61546->61547 61548 2c81fac _malloc 59 API calls 61547->61548 61549 2c75f6d 61548->61549 61550 2c81fac _malloc 59 API calls 61549->61550 61551 2c75f78 61550->61551 61552 2c81fac _malloc 59 API calls 61551->61552 61553 2c75f84 6 API calls 61552->61553 61554 2c75fd1 _memset 61553->61554 61555 2c75fea RtlEnterCriticalSection RtlLeaveCriticalSection 61554->61555 61556 2c81fac _malloc 59 API calls 61555->61556 61557 2c76026 61556->61557 61558 2c81fac _malloc 59 API calls 61557->61558 61559 2c76034 61558->61559 61560 2c81fac _malloc 59 API calls 61559->61560 61561 2c7603b 61560->61561 61562 2c81fac _malloc 59 API calls 61561->61562 61563 2c7605c QueryPerformanceCounter Sleep 61562->61563 61564 2c81fac _malloc 59 API calls 61563->61564 61565 2c76082 61564->61565 61566 2c81fac _malloc 59 API calls 61565->61566 61582 2c76092 _memset 61566->61582 61567 2c76105 RtlEnterCriticalSection RtlLeaveCriticalSection 61567->61582 61568 2c760ff Sleep 61568->61567 61569 2c76499 RtlEnterCriticalSection RtlLeaveCriticalSection 61570 2c8133c 66 API calls 61569->61570 61570->61582 61571 2c8133c 66 API calls 61571->61582 61572 2c81fac _malloc 59 API calls 61573 2c7653b RtlEnterCriticalSection RtlLeaveCriticalSection 61572->61573 61573->61582 61574 2c767f2 RtlEnterCriticalSection RtlLeaveCriticalSection 61574->61582 61575 2c75c0c 59 API calls 61575->61582 61576 2c81418 _sprintf 84 API calls 61576->61582 61577 2c71ba7 210 API calls 61577->61582 61578 2c76957 RtlEnterCriticalSection 61579 2c76984 RtlLeaveCriticalSection 61578->61579 61578->61582 61581 2c73c67 72 API calls 61579->61581 61580 2c81fac _malloc 59 API calls 61580->61582 61581->61582 61582->61567 61582->61568 61582->61569 61582->61571 61582->61572 61582->61574 61582->61575 61582->61576 61582->61577 61582->61578 61582->61579 61582->61580 61583 2c73d7e 64 API calls 61582->61583 61584 2c77336 89 API calls 61582->61584 61585 2c77fff 88 API calls 61582->61585 61586 2c81f74 _free 59 API calls 61582->61586 61587 2c825e6 65 API calls _strtok 61582->61587 61588 2c79721 73 API calls 61582->61588 61589 2c827b5 _Allocate 60 API calls 61582->61589 61590 2c773e5 71 API calls 61582->61590 61591 2c81850 _swscanf 59 API calls 61582->61591 61592 2c733b2 86 API calls 61582->61592 61593 2c78733 212 API calls 61582->61593 61594 2c7984b 60 API calls 61582->61594 61595 2c75119 103 API calls 61582->61595 61596 2c7c113 73 API calls 61582->61596 61597 2c79c0b 210 API calls 61582->61597 61598 2c7676f Sleep 61582->61598 61600 2c7676a shared_ptr 61582->61600 61583->61582 61584->61582 61585->61582 61586->61582 61587->61582 61588->61582 61589->61582 61590->61582 61591->61582 61592->61582 61593->61582 61594->61582 61595->61582 61596->61582 61597->61582 61599 2c808f0 GetProcessHeap HeapFree 61598->61599 61599->61600 61600->61582 61600->61598 61601 2c74100 GetProcessHeap HeapFree 61600->61601 61601->61600 61603 4016be 61604 4016e1 61603->61604 61605 40d232 ExitProcess 61604->61605

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 0 2c75e59-2c760e7 RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress call 2c742c7 GetTickCount call 2c759f4 GetVersionExA call 2c83750 call 2c81fac * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2c83750 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c81fac * 4 QueryPerformanceCounter Sleep call 2c81fac * 2 call 2c83750 * 2 45 2c760eb-2c760ed 0->45 46 2c760f6-2c760f8 45->46 47 2c760ef-2c760f4 45->47 48 2c76105-2c76134 RtlEnterCriticalSection RtlLeaveCriticalSection 46->48 49 2c760fa 46->49 50 2c760ff Sleep 47->50 51 2c763b5-2c763fb 48->51 49->50 50->48 53 2c763fd 51->53 54 2c76408 51->54 55 2c76417-2c7641c 53->55 56 2c7647c-2c76493 call 2c7439c 54->56 57 2c7640a 54->57 59 2c76426-2c7642a 55->59 60 2c7641f-2c76425 55->60 56->45 63 2c76499-2c764c4 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c8133c 56->63 57->55 59->51 62 2c7642c-2c76443 59->62 60->59 64 2c76445-2c7644b 62->64 65 2c7645f-2c76469 62->65 74 2c764c6-2c764d5 call 2c8133c 63->74 75 2c7650e-2c76526 call 2c8133c 63->75 67 2c76451-2c7645e call 2c7534d 64->67 68 2c7644d-2c7644f 64->68 65->45 72 2c7646f-2c7647b call 2c83750 65->72 67->65 68->65 72->56 74->75 83 2c764d7-2c764e6 call 2c8133c 74->83 81 2c767cd-2c767dc call 2c8133c 75->81 82 2c7652c-2c7652e 75->82 90 2c76821-2c76830 call 2c8133c 81->90 91 2c767de-2c767e0 81->91 82->81 85 2c76534-2c765df call 2c81fac RtlEnterCriticalSection RtlLeaveCriticalSection call 2c83750 * 5 call 2c7439c * 2 82->85 83->75 93 2c764e8-2c764f7 call 2c8133c 83->93 137 2c765e1-2c765e3 85->137 138 2c7661c 85->138 105 2c76845-2c76854 call 2c8133c 90->105 106 2c76832-2c7683b call 2c75c0c call 2c75d1a 90->106 91->90 94 2c767e2-2c7681c call 2c83750 RtlEnterCriticalSection RtlLeaveCriticalSection 91->94 93->75 102 2c764f9-2c76508 call 2c8133c 93->102 94->45 102->45 102->75 105->45 116 2c7685a-2c7685c 105->116 119 2c76840 106->119 116->45 120 2c76862-2c7687b call 2c7439c 116->120 119->45 120->45 126 2c76881-2c76950 call 2c81418 call 2c71ba7 120->126 135 2c76957-2c76978 RtlEnterCriticalSection 126->135 136 2c76952 call 2c7143f 126->136 141 2c76984-2c769eb RtlLeaveCriticalSection call 2c73c67 call 2c73d7e call 2c77336 135->141 142 2c7697a-2c76981 135->142 136->135 137->138 143 2c765e5-2c765f7 call 2c8133c 137->143 139 2c76620-2c7664e call 2c81fac call 2c83750 call 2c7439c 138->139 161 2c76650-2c7665f call 2c825e6 139->161 162 2c7668f-2c76698 call 2c81f74 139->162 163 2c76b53-2c76b67 call 2c77fff 141->163 164 2c769f1-2c76a33 call 2c79721 141->164 142->141 143->138 152 2c765f9-2c7661a call 2c7439c 143->152 152->139 161->162 175 2c76661 161->175 173 2c7669e-2c766b6 call 2c827b5 162->173 174 2c767bb-2c767c8 162->174 163->45 176 2c76b1d-2c76b2e call 2c773e5 164->176 177 2c76a39-2c76a40 164->177 187 2c766c2 173->187 188 2c766b8-2c766c0 call 2c78733 173->188 174->45 179 2c76666-2c76678 call 2c81850 175->179 185 2c76b33-2c76b4e call 2c733b2 176->185 181 2c76a43-2c76a48 177->181 194 2c7667d-2c7668d call 2c825e6 179->194 195 2c7667a 179->195 181->181 182 2c76a4a-2c76a8f call 2c79721 181->182 182->176 197 2c76a95-2c76a9b 182->197 185->163 193 2c766c4-2c76752 call 2c7984b call 2c73863 call 2c75119 call 2c73863 call 2c79af1 call 2c79c0b 187->193 188->193 218 2c76757-2c76768 193->218 194->162 194->179 195->194 201 2c76a9e-2c76aa3 197->201 201->201 203 2c76aa5-2c76ae0 call 2c79721 201->203 203->176 210 2c76ae2-2c76b16 call 2c7c113 203->210 214 2c76b1b-2c76b1c 210->214 214->176 219 2c7676f-2c7679a Sleep call 2c808f0 218->219 220 2c7676a call 2c7380b 218->220 224 2c767a6-2c767b4 219->224 225 2c7679c-2c767a5 call 2c74100 219->225 220->219 224->174 226 2c767b6 call 2c7380b 224->226 225->224 226->174
                                                                                                        APIs
                                                                                                        • RtlInitializeCriticalSection.NTDLL(02CA4FD0), ref: 02C75E8D
                                                                                                        • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 02C75EA4
                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 02C75EAD
                                                                                                        • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02C75EBC
                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 02C75EBF
                                                                                                        • GetTickCount.KERNEL32 ref: 02C75ED3
                                                                                                          • Part of subcall function 02C759F4: _malloc.LIBCMT ref: 02C75A02
                                                                                                        • GetVersionExA.KERNEL32(02CA4E20), ref: 02C75F00
                                                                                                        • _memset.LIBCMT ref: 02C75F1F
                                                                                                        • _malloc.LIBCMT ref: 02C75F2C
                                                                                                          • Part of subcall function 02C81FAC: __FF_MSGBANNER.LIBCMT ref: 02C81FC3
                                                                                                          • Part of subcall function 02C81FAC: __NMSG_WRITE.LIBCMT ref: 02C81FCA
                                                                                                          • Part of subcall function 02C81FAC: RtlAllocateHeap.NTDLL(008F0000,00000000,00000001), ref: 02C81FEF
                                                                                                        • _malloc.LIBCMT ref: 02C75F3C
                                                                                                        • _malloc.LIBCMT ref: 02C75F47
                                                                                                        • _malloc.LIBCMT ref: 02C75F52
                                                                                                        • _malloc.LIBCMT ref: 02C75F5D
                                                                                                        • _malloc.LIBCMT ref: 02C75F68
                                                                                                        • _malloc.LIBCMT ref: 02C75F73
                                                                                                        • _malloc.LIBCMT ref: 02C75F7F
                                                                                                        • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02C75F96
                                                                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 02C75F9F
                                                                                                        • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02C75FAB
                                                                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 02C75FAE
                                                                                                        • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02C75FB9
                                                                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 02C75FBC
                                                                                                        • _memset.LIBCMT ref: 02C75FCC
                                                                                                        • _memset.LIBCMT ref: 02C75FD8
                                                                                                        • _memset.LIBCMT ref: 02C75FE5
                                                                                                        • RtlEnterCriticalSection.NTDLL(02CA4FD0), ref: 02C75FF3
                                                                                                        • RtlLeaveCriticalSection.NTDLL(02CA4FD0), ref: 02C76000
                                                                                                        • _malloc.LIBCMT ref: 02C76021
                                                                                                        • _malloc.LIBCMT ref: 02C7602F
                                                                                                        • _malloc.LIBCMT ref: 02C76036
                                                                                                        • _malloc.LIBCMT ref: 02C76057
                                                                                                        • QueryPerformanceCounter.KERNEL32(00000200), ref: 02C76063
                                                                                                        • Sleep.KERNELBASE(00000000), ref: 02C76071
                                                                                                        • _malloc.LIBCMT ref: 02C7607D
                                                                                                        • _malloc.LIBCMT ref: 02C7608D
                                                                                                        • _memset.LIBCMT ref: 02C760A2
                                                                                                        • _memset.LIBCMT ref: 02C760B2
                                                                                                        • Sleep.KERNELBASE(0000EA60), ref: 02C760FF
                                                                                                        • RtlEnterCriticalSection.NTDLL(02CA4FD0), ref: 02C7610A
                                                                                                        • RtlLeaveCriticalSection.NTDLL(02CA4FD0), ref: 02C7611B
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _malloc$Heap$_memset$CriticalSection$Allocate$Process$AddressEnterHandleLeaveModuleProcSleep$CountCounterInitializePerformanceQueryTickVersion
                                                                                                        • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$gpt=%.8x&advizor=%d&box=%d&hp=%x&lp=%x&line=%d&os=%d.%d.%04d&flag=%d&itd=%d$ntdll.dll$sprintf$strcat
                                                                                                        • API String ID: 1856495841-1038016512
                                                                                                        • Opcode ID: 3e6f40dfbfcaea2698e0460181e5ea0901363b856d481e10c4148f3d00b79966
                                                                                                        • Instruction ID: 81ded203b9d54f216780fadc33a4b56286206719d791585a42a570fb2a7624ef
                                                                                                        • Opcode Fuzzy Hash: 3e6f40dfbfcaea2698e0460181e5ea0901363b856d481e10c4148f3d00b79966
                                                                                                        • Instruction Fuzzy Hash: 0571C5B1D483809FD720BF74AC19B5B7BE8AF85708F044D29F58897240DBB989158FD6

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 762 2c7e9a6-2c7e9c9 LoadLibraryA 763 2c7e9cf-2c7e9dd GetProcAddress 762->763 764 2c7ea89-2c7ea90 762->764 765 2c7e9e3-2c7e9f3 763->765 766 2c7ea82-2c7ea83 FreeLibrary 763->766 767 2c7e9f5-2c7ea01 GetAdaptersInfo 765->767 766->764 768 2c7ea03 767->768 769 2c7ea39-2c7ea41 767->769 772 2c7ea05-2c7ea0c 768->772 770 2c7ea43-2c7ea49 call 2c826cf 769->770 771 2c7ea4a-2c7ea4f 769->771 770->771 774 2c7ea51-2c7ea54 771->774 775 2c7ea7d-2c7ea81 771->775 776 2c7ea16-2c7ea1e 772->776 777 2c7ea0e-2c7ea12 772->777 774->775 779 2c7ea56-2c7ea5b 774->779 775->766 781 2c7ea21-2c7ea26 776->781 777->772 780 2c7ea14 777->780 782 2c7ea5d-2c7ea65 779->782 783 2c7ea68-2c7ea73 call 2c827b5 779->783 780->769 781->781 784 2c7ea28-2c7ea35 call 2c7e6f5 781->784 782->783 783->775 789 2c7ea75-2c7ea78 783->789 784->769 789->767
                                                                                                        APIs
                                                                                                        • LoadLibraryA.KERNELBASE(iphlpapi.dll), ref: 02C7E9BC
                                                                                                        • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 02C7E9D5
                                                                                                        • GetAdaptersInfo.IPHLPAPI(?,?), ref: 02C7E9FA
                                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 02C7EA83
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                                                        • String ID: GetAdaptersInfo$iphlpapi.dll
                                                                                                        • API String ID: 514930453-3114217049
                                                                                                        • Opcode ID: 8d4be22ad9a2b770850bce2d24b573ffa9f5324434a10007ebd9ccb870ec94dc
                                                                                                        • Instruction ID: f3863a6e192bc4442b86fcb8d068430a328af5e89cc36dea26a6819e5d8c7785
                                                                                                        • Opcode Fuzzy Hash: 8d4be22ad9a2b770850bce2d24b573ffa9f5324434a10007ebd9ccb870ec94dc
                                                                                                        • Instruction Fuzzy Hash: E521B172A40209ABDB11DFA9D884AEEBFB9BF85324F1441E9D504E7201DB309E45CBA0

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 790 2c72b95-2c72baf 791 2c72bc7-2c72bcb 790->791 792 2c72bb1-2c72bb9 call 2c7fb10 790->792 794 2c72bdf 791->794 795 2c72bcd-2c72bd0 791->795 799 2c72bbf-2c72bc2 792->799 798 2c72be2-2c72c11 WSASetLastError WSARecv call 2c79505 794->798 795->794 797 2c72bd2-2c72bdd call 2c7fb10 795->797 797->799 804 2c72c16-2c72c1d 798->804 802 2c72d30 799->802 805 2c72d32-2c72d38 802->805 806 2c72c1f-2c72c2a call 2c7fb10 804->806 807 2c72c2c-2c72c32 804->807 815 2c72c3f-2c72c42 806->815 808 2c72c46-2c72c48 807->808 809 2c72c34-2c72c39 call 2c7fb10 807->809 812 2c72c4f-2c72c60 call 2c7fb10 808->812 813 2c72c4a-2c72c4d 808->813 809->815 812->805 817 2c72c66-2c72c69 812->817 813->817 815->808 820 2c72c73-2c72c76 817->820 821 2c72c6b-2c72c6d 817->821 820->802 823 2c72c7c-2c72c9a call 2c7fb10 call 2c7166f 820->823 821->820 822 2c72d22-2c72d2d call 2c71996 821->822 822->802 830 2c72cbc-2c72cfa WSASetLastError select call 2c79505 823->830 831 2c72c9c-2c72cba call 2c7fb10 call 2c7166f 823->831 837 2c72cfc-2c72d06 call 2c7fb10 830->837 838 2c72d08 830->838 831->802 831->830 843 2c72d19-2c72d1d 837->843 841 2c72d15-2c72d17 838->841 842 2c72d0a-2c72d12 call 2c7fb10 838->842 841->802 841->843 842->841 843->798
                                                                                                        APIs
                                                                                                        • WSASetLastError.WS2_32(00000000), ref: 02C72BE4
                                                                                                        • WSARecv.WS2_32(?,?,?,?,?,00000000,00000000), ref: 02C72C07
                                                                                                          • Part of subcall function 02C79505: WSAGetLastError.WS2_32(00000000,?,?,02C72A51), ref: 02C79513
                                                                                                        • WSASetLastError.WS2_32 ref: 02C72CD3
                                                                                                        • select.WS2_32(?,?,00000000,00000000,00000000), ref: 02C72CE7
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$Recvselect
                                                                                                        • String ID: 3'
                                                                                                        • API String ID: 886190287-280543908
                                                                                                        • Opcode ID: 7206877a7cbb77a992e628f6bf35ce2bedcedc0654226b3d2459614ddf7afd00
                                                                                                        • Instruction ID: b744d4d18ef6987f34182f4a14141e65ac906a5289f16d85b768be722ba4f060
                                                                                                        • Opcode Fuzzy Hash: 7206877a7cbb77a992e628f6bf35ce2bedcedc0654226b3d2459614ddf7afd00
                                                                                                        • Instruction Fuzzy Hash: 6C4148B1A083019FD7109F74D95476BBBE9EF983A4F204D1EE89987280EB74D640DB92

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 847 2c7e8a2-2c7e8cd CreateFileA 848 2c7e8d3-2c7e8e8 847->848 849 2c7e99e-2c7e9a5 847->849 850 2c7e8eb-2c7e90d DeviceIoControl 848->850 851 2c7e946-2c7e94e 850->851 852 2c7e90f-2c7e917 850->852 853 2c7e957-2c7e959 851->853 854 2c7e950-2c7e956 call 2c826cf 851->854 855 2c7e920-2c7e925 852->855 856 2c7e919-2c7e91e 852->856 858 2c7e994-2c7e99d CloseHandle 853->858 859 2c7e95b-2c7e95e 853->859 854->853 855->851 860 2c7e927-2c7e92f 855->860 856->851 858->849 862 2c7e960-2c7e969 GetLastError 859->862 863 2c7e97a-2c7e987 call 2c827b5 859->863 864 2c7e932-2c7e937 860->864 862->858 866 2c7e96b-2c7e96e 862->866 863->858 872 2c7e989-2c7e98f 863->872 864->864 865 2c7e939-2c7e945 call 2c7e6f5 864->865 865->851 866->863 869 2c7e970-2c7e977 866->869 869->863 872->850
                                                                                                        APIs
                                                                                                        • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 02C7E8C1
                                                                                                        • DeviceIoControl.KERNELBASE(00000000,002D1400,?,0000000C,?,00000400,?,00000000), ref: 02C7E8FF
                                                                                                        • GetLastError.KERNEL32 ref: 02C7E960
                                                                                                        • CloseHandle.KERNELBASE(?), ref: 02C7E997
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                                                                        • String ID: \\.\PhysicalDrive0
                                                                                                        • API String ID: 4026078076-1180397377
                                                                                                        • Opcode ID: 89c20cbf5bbd69304b558278cc58f12a4a026e4a2fa402905a399da4621c1fc4
                                                                                                        • Instruction ID: 518767fb77599aa8f58ef877d61ad47d70f5e4f5e74f595bc06fe16f159236d4
                                                                                                        • Opcode Fuzzy Hash: 89c20cbf5bbd69304b558278cc58f12a4a026e4a2fa402905a399da4621c1fc4
                                                                                                        • Instruction Fuzzy Hash: 30318173D00219ABDB25DF95D888BEEBBB8EF85754F2441AAE505A7280D7705B04CBD0

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 230 2c763eb-2c763fb 231 2c763fd 230->231 232 2c76408 230->232 233 2c76417-2c7641c 231->233 234 2c7647c-2c76493 call 2c7439c 232->234 235 2c7640a 232->235 237 2c76426-2c7642a 233->237 238 2c7641f-2c76425 233->238 242 2c760eb-2c760ed 234->242 243 2c76499-2c764c4 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c8133c 234->243 235->233 240 2c763b5 237->240 241 2c7642c-2c76443 237->241 238->237 240->230 244 2c76445-2c7644b 241->244 245 2c7645f-2c76469 241->245 249 2c760f6-2c760f8 242->249 250 2c760ef-2c760f4 242->250 259 2c764c6-2c764d5 call 2c8133c 243->259 260 2c7650e-2c76526 call 2c8133c 243->260 247 2c76451-2c7645e call 2c7534d 244->247 248 2c7644d-2c7644f 244->248 245->242 257 2c7646f-2c7647b call 2c83750 245->257 247->245 248->245 252 2c76105-2c76134 RtlEnterCriticalSection RtlLeaveCriticalSection 249->252 253 2c760fa 249->253 256 2c760ff Sleep 250->256 252->240 253->256 256->252 257->234 259->260 268 2c764d7-2c764e6 call 2c8133c 259->268 266 2c767cd-2c767dc call 2c8133c 260->266 267 2c7652c-2c7652e 260->267 275 2c76821-2c76830 call 2c8133c 266->275 276 2c767de-2c767e0 266->276 267->266 270 2c76534-2c765df call 2c81fac RtlEnterCriticalSection RtlLeaveCriticalSection call 2c83750 * 5 call 2c7439c * 2 267->270 268->260 278 2c764e8-2c764f7 call 2c8133c 268->278 322 2c765e1-2c765e3 270->322 323 2c7661c 270->323 290 2c76845-2c76854 call 2c8133c 275->290 291 2c76832-2c76840 call 2c75c0c call 2c75d1a 275->291 276->275 279 2c767e2-2c7681c call 2c83750 RtlEnterCriticalSection RtlLeaveCriticalSection 276->279 278->260 287 2c764f9-2c76508 call 2c8133c 278->287 279->242 287->242 287->260 290->242 301 2c7685a-2c7685c 290->301 291->242 301->242 305 2c76862-2c7687b call 2c7439c 301->305 305->242 311 2c76881-2c76950 call 2c81418 call 2c71ba7 305->311 320 2c76957-2c76978 RtlEnterCriticalSection 311->320 321 2c76952 call 2c7143f 311->321 326 2c76984-2c769eb RtlLeaveCriticalSection call 2c73c67 call 2c73d7e call 2c77336 320->326 327 2c7697a-2c76981 320->327 321->320 322->323 328 2c765e5-2c765f7 call 2c8133c 322->328 324 2c76620-2c7664e call 2c81fac call 2c83750 call 2c7439c 323->324 346 2c76650-2c7665f call 2c825e6 324->346 347 2c7668f-2c76698 call 2c81f74 324->347 348 2c76b53-2c76b67 call 2c77fff 326->348 349 2c769f1-2c76a33 call 2c79721 326->349 327->326 328->323 337 2c765f9-2c7661a call 2c7439c 328->337 337->324 346->347 360 2c76661 346->360 358 2c7669e-2c766b6 call 2c827b5 347->358 359 2c767bb-2c767c8 347->359 348->242 361 2c76b1d-2c76b4e call 2c773e5 call 2c733b2 349->361 362 2c76a39-2c76a40 349->362 372 2c766c2 358->372 373 2c766b8-2c766c0 call 2c78733 358->373 359->242 364 2c76666-2c76678 call 2c81850 360->364 361->348 366 2c76a43-2c76a48 362->366 379 2c7667d-2c7668d call 2c825e6 364->379 380 2c7667a 364->380 366->366 367 2c76a4a-2c76a8f call 2c79721 366->367 367->361 382 2c76a95-2c76a9b 367->382 378 2c766c4-2c76768 call 2c7984b call 2c73863 call 2c75119 call 2c73863 call 2c79af1 call 2c79c0b 372->378 373->378 404 2c7676f-2c7679a Sleep call 2c808f0 378->404 405 2c7676a call 2c7380b 378->405 379->347 379->364 380->379 386 2c76a9e-2c76aa3 382->386 386->386 388 2c76aa5-2c76ae0 call 2c79721 386->388 388->361 395 2c76ae2-2c76b1c call 2c7c113 388->395 395->361 409 2c767a6-2c767b4 404->409 410 2c7679c-2c767a5 call 2c74100 404->410 405->404 409->359 411 2c767b6 call 2c7380b 409->411 410->409 411->359
                                                                                                        APIs
                                                                                                        • Sleep.KERNELBASE(0000EA60), ref: 02C760FF
                                                                                                        • RtlEnterCriticalSection.NTDLL(02CA4FD0), ref: 02C7610A
                                                                                                        • RtlLeaveCriticalSection.NTDLL(02CA4FD0), ref: 02C7611B
                                                                                                        • _memset.LIBCMT ref: 02C7647B
                                                                                                        • RtlEnterCriticalSection.NTDLL(02CA4FD0), ref: 02C7649E
                                                                                                        • RtlLeaveCriticalSection.NTDLL(02CA4FD0), ref: 02C764AF
                                                                                                        • _malloc.LIBCMT ref: 02C76536
                                                                                                        • RtlEnterCriticalSection.NTDLL(02CA4FD0), ref: 02C76548
                                                                                                        • RtlLeaveCriticalSection.NTDLL(02CA4FD0), ref: 02C76554
                                                                                                        • _memset.LIBCMT ref: 02C7656E
                                                                                                        • _memset.LIBCMT ref: 02C7657D
                                                                                                        • _memset.LIBCMT ref: 02C7658D
                                                                                                        • _memset.LIBCMT ref: 02C7659C
                                                                                                        • _memset.LIBCMT ref: 02C765AB
                                                                                                        • _malloc.LIBCMT ref: 02C76625
                                                                                                        • _memset.LIBCMT ref: 02C76636
                                                                                                        • _strtok.LIBCMT ref: 02C76656
                                                                                                        • _swscanf.LIBCMT ref: 02C7666D
                                                                                                        • _strtok.LIBCMT ref: 02C76684
                                                                                                        • _free.LIBCMT ref: 02C76690
                                                                                                        • Sleep.KERNEL32(000007D0), ref: 02C76774
                                                                                                        • _memset.LIBCMT ref: 02C767ED
                                                                                                        • RtlEnterCriticalSection.NTDLL(02CA4FD0), ref: 02C767FA
                                                                                                        • RtlLeaveCriticalSection.NTDLL(02CA4FD0), ref: 02C7680C
                                                                                                          • Part of subcall function 02C7439C: _memmove.LIBCMT ref: 02C74494
                                                                                                        • _sprintf.LIBCMT ref: 02C76896
                                                                                                        • RtlEnterCriticalSection.NTDLL(00000020), ref: 02C7695B
                                                                                                        • RtlLeaveCriticalSection.NTDLL(00000020), ref: 02C7698F
                                                                                                          • Part of subcall function 02C75C0C: _malloc.LIBCMT ref: 02C75C1A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CriticalSection$_memset$EnterLeave$_malloc$Sleep_strtok$_free_memmove_sprintf_swscanf
                                                                                                        • String ID: $%d;$<htm$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$auth_ip$auth_swith$block$connect$disconnect$idle$updips$updurls
                                                                                                        • API String ID: 1894048587-2823103634
                                                                                                        • Opcode ID: 32e486331b6c08a6e281f9e59a4baf6d0ef5fc7b3744f32dc48adf91e7b6760b
                                                                                                        • Instruction ID: dd6e360bcc1d2635615de938b82ed2f511714a8b8b22beb9378efce1736ff95a
                                                                                                        • Opcode Fuzzy Hash: 32e486331b6c08a6e281f9e59a4baf6d0ef5fc7b3744f32dc48adf91e7b6760b
                                                                                                        • Instruction Fuzzy Hash: 781243316087819FE734EB24D854BAFBBE9AFC5718F24492DE48D97281DB709504CF92

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 415 2c763ff-2c76402 416 2c76403-2c76404 415->416 417 2c76467-2c76469 416->417 418 2c76406-2c7640b 416->418 420 2c7646f-2c7647b call 2c83750 417->420 421 2c760eb-2c760ed 417->421 418->416 419 2c7640d-2c76412 418->419 425 2c76414-2c7641d 419->425 426 2c763dd-2c763df 419->426 427 2c7647c-2c76493 call 2c7439c 420->427 423 2c760f6-2c760f8 421->423 424 2c760ef-2c760f4 421->424 428 2c76105-2c76134 RtlEnterCriticalSection RtlLeaveCriticalSection 423->428 429 2c760fa 423->429 430 2c760ff Sleep 424->430 431 2c76426-2c7642a 425->431 432 2c7641f-2c76425 425->432 426->415 427->421 442 2c76499-2c764c4 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c8133c 427->442 434 2c763b5-2c763fb 428->434 429->430 430->428 431->434 435 2c7642c-2c76443 431->435 432->431 440 2c763fd 434->440 441 2c76408 434->441 437 2c76445-2c7644b 435->437 438 2c7645f-2c76463 435->438 443 2c76451-2c7645e call 2c7534d 437->443 444 2c7644d-2c7644f 437->444 438->417 445 2c76417-2c7641c 440->445 441->427 446 2c7640a 441->446 451 2c764c6-2c764d5 call 2c8133c 442->451 452 2c7650e-2c76526 call 2c8133c 442->452 443->438 444->438 445->431 445->432 446->445 451->452 459 2c764d7-2c764e6 call 2c8133c 451->459 457 2c767cd-2c767dc call 2c8133c 452->457 458 2c7652c-2c7652e 452->458 466 2c76821-2c76830 call 2c8133c 457->466 467 2c767de-2c767e0 457->467 458->457 461 2c76534-2c765df call 2c81fac RtlEnterCriticalSection RtlLeaveCriticalSection call 2c83750 * 5 call 2c7439c * 2 458->461 459->452 469 2c764e8-2c764f7 call 2c8133c 459->469 513 2c765e1-2c765e3 461->513 514 2c7661c 461->514 481 2c76845-2c76854 call 2c8133c 466->481 482 2c76832-2c76840 call 2c75c0c call 2c75d1a 466->482 467->466 470 2c767e2-2c7681c call 2c83750 RtlEnterCriticalSection RtlLeaveCriticalSection 467->470 469->452 478 2c764f9-2c76508 call 2c8133c 469->478 470->421 478->421 478->452 481->421 492 2c7685a-2c7685c 481->492 482->421 492->421 496 2c76862-2c7687b call 2c7439c 492->496 496->421 502 2c76881-2c76950 call 2c81418 call 2c71ba7 496->502 511 2c76957-2c76978 RtlEnterCriticalSection 502->511 512 2c76952 call 2c7143f 502->512 517 2c76984-2c769eb RtlLeaveCriticalSection call 2c73c67 call 2c73d7e call 2c77336 511->517 518 2c7697a-2c76981 511->518 512->511 513->514 519 2c765e5-2c765f7 call 2c8133c 513->519 515 2c76620-2c7664e call 2c81fac call 2c83750 call 2c7439c 514->515 537 2c76650-2c7665f call 2c825e6 515->537 538 2c7668f-2c76698 call 2c81f74 515->538 539 2c76b53-2c76b67 call 2c77fff 517->539 540 2c769f1-2c76a33 call 2c79721 517->540 518->517 519->514 528 2c765f9-2c7661a call 2c7439c 519->528 528->515 537->538 551 2c76661 537->551 549 2c7669e-2c766b6 call 2c827b5 538->549 550 2c767bb-2c767c8 538->550 539->421 552 2c76b1d-2c76b4e call 2c773e5 call 2c733b2 540->552 553 2c76a39-2c76a40 540->553 563 2c766c2 549->563 564 2c766b8-2c766c0 call 2c78733 549->564 550->421 555 2c76666-2c76678 call 2c81850 551->555 552->539 557 2c76a43-2c76a48 553->557 570 2c7667d-2c7668d call 2c825e6 555->570 571 2c7667a 555->571 557->557 558 2c76a4a-2c76a8f call 2c79721 557->558 558->552 573 2c76a95-2c76a9b 558->573 569 2c766c4-2c76768 call 2c7984b call 2c73863 call 2c75119 call 2c73863 call 2c79af1 call 2c79c0b 563->569 564->569 595 2c7676f-2c7679a Sleep call 2c808f0 569->595 596 2c7676a call 2c7380b 569->596 570->538 570->555 571->570 577 2c76a9e-2c76aa3 573->577 577->577 579 2c76aa5-2c76ae0 call 2c79721 577->579 579->552 586 2c76ae2-2c76b1c call 2c7c113 579->586 586->552 600 2c767a6-2c767b4 595->600 601 2c7679c-2c767a5 call 2c74100 595->601 596->595 600->550 602 2c767b6 call 2c7380b 600->602 601->600 602->550
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _memset$CriticalSection$EnterLeave_malloc$_strtok
                                                                                                        • String ID: <htm$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$auth_ip$auth_swith$block$connect$disconnect$idle$updips$updurls
                                                                                                        • API String ID: 3726938813-1437582238
                                                                                                        • Opcode ID: 25ba234fad5b555aa549a27121b5d85cb61a313c1ce0f8276ea7d9f14b951fca
                                                                                                        • Instruction ID: e4af7b76faf68c9f0a91773e2d35cdb54d34523a87f5a8a85cf29b2b580315ba
                                                                                                        • Opcode Fuzzy Hash: 25ba234fad5b555aa549a27121b5d85cb61a313c1ce0f8276ea7d9f14b951fca
                                                                                                        • Instruction Fuzzy Hash: B0A18831648781ABE725BB34AC15B6F7BEA9FC271CF24042DF48997281DB719900CB96

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02C71D11
                                                                                                        • GetLastError.KERNEL32 ref: 02C71D23
                                                                                                          • Part of subcall function 02C71712: __EH_prolog.LIBCMT ref: 02C71717
                                                                                                        • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02C71D59
                                                                                                        • GetLastError.KERNEL32 ref: 02C71D6B
                                                                                                        • __beginthreadex.LIBCMT ref: 02C71DB1
                                                                                                        • GetLastError.KERNEL32 ref: 02C71DC6
                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 02C71DDD
                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 02C71DEC
                                                                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 02C71E14
                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 02C71E1B
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseErrorHandleLast$CreateEvent$H_prologObjectSingleWait__beginthreadex
                                                                                                        • String ID: thread$thread.entry_event$thread.exit_event
                                                                                                        • API String ID: 831262434-3017686385
                                                                                                        • Opcode ID: fc0f39e821c883356e98ee9a2b83e99ef0882bba850a59b28461b644e3fc5dd7
                                                                                                        • Instruction ID: cc2f7285fa7a9aa0cdc161a13afb8f129d0e7649ea477ce992318f7f2819c3e3
                                                                                                        • Opcode Fuzzy Hash: fc0f39e821c883356e98ee9a2b83e99ef0882bba850a59b28461b644e3fc5dd7
                                                                                                        • Instruction Fuzzy Hash: 16316D71A003019FD701EF24C888B2BBBA9EF84790F14496DF9599B290DB719949CFD2

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • __EH_prolog.LIBCMT ref: 02C74D8B
                                                                                                        • RtlEnterCriticalSection.NTDLL(02CA4FD0), ref: 02C74DB7
                                                                                                        • RtlLeaveCriticalSection.NTDLL(02CA4FD0), ref: 02C74DC3
                                                                                                          • Part of subcall function 02C74BED: __EH_prolog.LIBCMT ref: 02C74BF2
                                                                                                          • Part of subcall function 02C74BED: InterlockedExchange.KERNEL32(?,00000000), ref: 02C74CF2
                                                                                                        • RtlEnterCriticalSection.NTDLL(02CA4FD0), ref: 02C74E93
                                                                                                        • RtlLeaveCriticalSection.NTDLL(02CA4FD0), ref: 02C74E99
                                                                                                        • RtlEnterCriticalSection.NTDLL(02CA4FD0), ref: 02C74EA0
                                                                                                        • RtlLeaveCriticalSection.NTDLL(02CA4FD0), ref: 02C74EA6
                                                                                                        • RtlEnterCriticalSection.NTDLL(02CA4FD0), ref: 02C750A7
                                                                                                        • RtlLeaveCriticalSection.NTDLL(02CA4FD0), ref: 02C750AD
                                                                                                        • RtlEnterCriticalSection.NTDLL(02CA4FD0), ref: 02C750B8
                                                                                                        • RtlLeaveCriticalSection.NTDLL(02CA4FD0), ref: 02C750C1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CriticalSection$EnterLeave$H_prolog$ExchangeInterlocked
                                                                                                        • String ID:
                                                                                                        • API String ID: 2062355503-0
                                                                                                        • Opcode ID: 52a305069ddd9c6eed1cec8900d5c316d1e061d9cd83e4f2de34c754514a3a50
                                                                                                        • Instruction ID: 57fddee1feb759bc802ea5784431b868d39cea79b8eaadedb9f5aefcb4c3b495
                                                                                                        • Opcode Fuzzy Hash: 52a305069ddd9c6eed1cec8900d5c316d1e061d9cd83e4f2de34c754514a3a50
                                                                                                        • Instruction Fuzzy Hash: B1B17C71D0025EDFEF25DFA0D844BEEBBB9AF04318F10405AE81576280DBB55A89DFA1

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 707 401301-40135e FindResourceA 708 401360-401362 707->708 709 401367-40137d SizeofResource 707->709 710 401538-40153c 708->710 711 401386-4013fe LoadResource LockResource GlobalAlloc call 402490 * 2 709->711 712 40137f-401381 709->712 717 401407-40140b 711->717 712->710 718 40140d-40141d 717->718 719 40141f-401428 GetTickCount 717->719 718->717 721 401491-401499 719->721 722 40142a-40142e 719->722 723 4014a2-4014a8 721->723 724 401430-401438 722->724 725 40148f 722->725 726 4014f0-401525 GlobalAlloc call 401000 723->726 727 4014aa-4014e8 723->727 728 401441-401447 724->728 725->726 735 40152a-401535 726->735 729 4014ea 727->729 730 4014ee 727->730 732 401449-401485 728->732 733 40148d 728->733 729->730 730->723 736 401487 732->736 737 40148b 732->737 733->722 735->710 736->737 737->728
                                                                                                        APIs
                                                                                                        • FindResourceA.KERNEL32(?,0000000A), ref: 00401351
                                                                                                        • SizeofResource.KERNEL32(00000000), ref: 00401370
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3289387182.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3289387182.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_400000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Resource$FindSizeof
                                                                                                        • String ID:
                                                                                                        • API String ID: 3019604839-3916222277
                                                                                                        • Opcode ID: d05602b0e20a881077e161112d5bd34232c8f71c7560e683aad862cf59917e15
                                                                                                        • Instruction ID: 779852d327d389dbbb2f1b261a2bb7141e3a4eae573781fe7d13a424a4f3f89b
                                                                                                        • Opcode Fuzzy Hash: d05602b0e20a881077e161112d5bd34232c8f71c7560e683aad862cf59917e15
                                                                                                        • Instruction Fuzzy Hash: F1811075D04258DFDF01CFE8D985AEEBBB0BF09305F1400AAE581B7262C3385A84DB69

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • RtlEnterCriticalSection.NTDLL(?), ref: 02C72706
                                                                                                        • CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02C7272B
                                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02C93163), ref: 02C72738
                                                                                                          • Part of subcall function 02C71712: __EH_prolog.LIBCMT ref: 02C71717
                                                                                                        • SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000), ref: 02C72778
                                                                                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 02C727D9
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                                                        • String ID: timer
                                                                                                        • API String ID: 4293676635-1792073242
                                                                                                        • Opcode ID: d38b40a4a2194d8e012a0d94a72b71d506827e8eaafc9c079b48294fe5b20c3c
                                                                                                        • Instruction ID: 3f59c2430b630584d6b8f50a4aac8c6fbda3442d92bda7171ef6068df1726693
                                                                                                        • Opcode Fuzzy Hash: d38b40a4a2194d8e012a0d94a72b71d506827e8eaafc9c079b48294fe5b20c3c
                                                                                                        • Instruction Fuzzy Hash: D231B0B1904745AFD310DF65D988B56BBE8FB48B64F004A2EF85583A80D770E954CFD2

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 873 2c71ba7-2c71bcf call 2c92a00 RtlEnterCriticalSection 876 2c71bd1 873->876 877 2c71be9-2c71bf7 RtlLeaveCriticalSection call 2c7d32f 873->877 878 2c71bd4-2c71be0 call 2c71b79 876->878 879 2c71bfa-2c71c20 RtlEnterCriticalSection 877->879 883 2c71c55-2c71c6e RtlLeaveCriticalSection 878->883 884 2c71be2-2c71be7 878->884 881 2c71c34-2c71c36 879->881 885 2c71c22-2c71c2f call 2c71b79 881->885 886 2c71c38-2c71c43 881->886 884->877 884->878 888 2c71c45-2c71c4b 885->888 891 2c71c31 885->891 886->888 888->883 890 2c71c4d-2c71c51 888->890 890->883 891->881
                                                                                                        APIs
                                                                                                        • __EH_prolog.LIBCMT ref: 02C71BAC
                                                                                                        • RtlEnterCriticalSection.NTDLL ref: 02C71BBC
                                                                                                        • RtlLeaveCriticalSection.NTDLL ref: 02C71BEA
                                                                                                        • RtlEnterCriticalSection.NTDLL ref: 02C71C13
                                                                                                        • RtlLeaveCriticalSection.NTDLL ref: 02C71C56
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CriticalSection$EnterLeave$H_prolog
                                                                                                        • String ID:
                                                                                                        • API String ID: 1633115879-0
                                                                                                        • Opcode ID: 6331e0c13f679b81e22372468587adcbb59a512f75d6039964de571a04eac510
                                                                                                        • Instruction ID: f7799160d9271c5724cb0f2f7a207c9c16477fcef0a2ef416ce8c4abae6ad728
                                                                                                        • Opcode Fuzzy Hash: 6331e0c13f679b81e22372468587adcbb59a512f75d6039964de571a04eac510
                                                                                                        • Instruction Fuzzy Hash: 4921ADB5A00604DFDB15CF68C84879ABBB5FF88714F148549EC5997300D7B1EA05CBE0

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 893 40185b-40185e 894 401860 893->894 895 4018c1-401fd0 893->895 896 401861-4022f6 894->896 897 40184b-40185a 894->897 900 40df59-40dfea VirtualAlloc GetModuleHandleA 895->900 901 40d56c-40d572 call 402940 896->901 902 40dccd 896->902 897->893 902->900
                                                                                                        APIs
                                                                                                        • VirtualAlloc.KERNELBASE(00000000,00000040,00003000,00000040,00409068), ref: 0040DF5B
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3289387182.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3289387182.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_400000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AllocVirtual
                                                                                                        • String ID: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe$cros$e\Mi$twar
                                                                                                        • API String ID: 4275171209-684312094
                                                                                                        • Opcode ID: 641002bfcb48237416e219fa04bfe2960f12948c938c3a8b51f8d231349e2a5c
                                                                                                        • Instruction ID: 714f81136e9ce433e419b1386edf35e94bc7d565da55538d034c3c9e71e0c12b
                                                                                                        • Opcode Fuzzy Hash: 641002bfcb48237416e219fa04bfe2960f12948c938c3a8b51f8d231349e2a5c
                                                                                                        • Instruction Fuzzy Hash: E7119074908746DFD7059FA5CCA5BE9BBB0EB00310F2041ABE1567B7D1C2789A46DB0E

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 907 2c76bc0-2c76bcd 908 2c76b65-2c76b67 907->908 909 2c76bcf-2c76c01 907->909 910 2c760eb-2c760ed 908->910 912 2c76c03-2c76c0c 909->912 913 2c76c59 909->913 914 2c760f6-2c760f8 910->914 915 2c760ef-2c760f4 910->915 918 2c76c11-2c76c12 912->918 913->913 916 2c76105-2c76134 RtlEnterCriticalSection RtlLeaveCriticalSection 914->916 917 2c760fa 914->917 919 2c760ff Sleep 915->919 922 2c763b5-2c763fb 916->922 917->919 920 2c76c44-2c76c45 918->920 921 2c76c14 918->921 919->916 920->913 921->918 923 2c76c16 921->923 925 2c763fd 922->925 926 2c76408 922->926 923->918 927 2c76c18-2c76c27 923->927 928 2c76417-2c7641c 925->928 929 2c7647c-2c76493 call 2c7439c 926->929 930 2c7640a 926->930 932 2c76426-2c7642a 928->932 933 2c7641f-2c76425 928->933 929->910 936 2c76499-2c764c4 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c8133c 929->936 930->928 932->922 935 2c7642c-2c76443 932->935 933->932 937 2c76445-2c7644b 935->937 938 2c7645f-2c76469 935->938 947 2c764c6-2c764d5 call 2c8133c 936->947 948 2c7650e-2c76526 call 2c8133c 936->948 940 2c76451-2c7645e call 2c7534d 937->940 941 2c7644d-2c7644f 937->941 938->910 945 2c7646f-2c7647b call 2c83750 938->945 940->938 941->938 945->929 947->948 956 2c764d7-2c764e6 call 2c8133c 947->956 954 2c767cd-2c767dc call 2c8133c 948->954 955 2c7652c-2c7652e 948->955 963 2c76821-2c76830 call 2c8133c 954->963 964 2c767de-2c767e0 954->964 955->954 958 2c76534-2c765df call 2c81fac RtlEnterCriticalSection RtlLeaveCriticalSection call 2c83750 * 5 call 2c7439c * 2 955->958 956->948 966 2c764e8-2c764f7 call 2c8133c 956->966 1010 2c765e1-2c765e3 958->1010 1011 2c7661c 958->1011 978 2c76845-2c76854 call 2c8133c 963->978 979 2c76832-2c76840 call 2c75c0c call 2c75d1a 963->979 964->963 967 2c767e2-2c7681c call 2c83750 RtlEnterCriticalSection RtlLeaveCriticalSection 964->967 966->948 975 2c764f9-2c76508 call 2c8133c 966->975 967->910 975->910 975->948 978->910 989 2c7685a-2c7685c 978->989 979->910 989->910 993 2c76862-2c7687b call 2c7439c 989->993 993->910 999 2c76881-2c76950 call 2c81418 call 2c71ba7 993->999 1008 2c76957-2c76978 RtlEnterCriticalSection 999->1008 1009 2c76952 call 2c7143f 999->1009 1014 2c76984-2c769eb RtlLeaveCriticalSection call 2c73c67 call 2c73d7e call 2c77336 1008->1014 1015 2c7697a-2c76981 1008->1015 1009->1008 1010->1011 1016 2c765e5-2c765f7 call 2c8133c 1010->1016 1012 2c76620-2c7664e call 2c81fac call 2c83750 call 2c7439c 1011->1012 1034 2c76650-2c7665f call 2c825e6 1012->1034 1035 2c7668f-2c76698 call 2c81f74 1012->1035 1036 2c76b53-2c76b67 call 2c77fff 1014->1036 1037 2c769f1-2c76a33 call 2c79721 1014->1037 1015->1014 1016->1011 1025 2c765f9-2c7661a call 2c7439c 1016->1025 1025->1012 1034->1035 1048 2c76661 1034->1048 1046 2c7669e-2c766b6 call 2c827b5 1035->1046 1047 2c767bb-2c767c8 1035->1047 1036->910 1049 2c76b1d-2c76b4e call 2c773e5 call 2c733b2 1037->1049 1050 2c76a39-2c76a40 1037->1050 1060 2c766c2 1046->1060 1061 2c766b8-2c766c0 call 2c78733 1046->1061 1047->910 1052 2c76666-2c76678 call 2c81850 1048->1052 1049->1036 1054 2c76a43-2c76a48 1050->1054 1067 2c7667d-2c7668d call 2c825e6 1052->1067 1068 2c7667a 1052->1068 1054->1054 1055 2c76a4a-2c76a8f call 2c79721 1054->1055 1055->1049 1070 2c76a95-2c76a9b 1055->1070 1066 2c766c4-2c76768 call 2c7984b call 2c73863 call 2c75119 call 2c73863 call 2c79af1 call 2c79c0b 1060->1066 1061->1066 1092 2c7676f-2c7679a Sleep call 2c808f0 1066->1092 1093 2c7676a call 2c7380b 1066->1093 1067->1035 1067->1052 1068->1067 1074 2c76a9e-2c76aa3 1070->1074 1074->1074 1076 2c76aa5-2c76ae0 call 2c79721 1074->1076 1076->1049 1083 2c76ae2-2c76b1c call 2c7c113 1076->1083 1083->1049 1097 2c767a6-2c767b4 1092->1097 1098 2c7679c-2c767a5 call 2c74100 1092->1098 1093->1092 1097->1047 1099 2c767b6 call 2c7380b 1097->1099 1098->1097 1099->1047
                                                                                                        APIs
                                                                                                        • Sleep.KERNELBASE(0000EA60), ref: 02C760FF
                                                                                                        • RtlEnterCriticalSection.NTDLL(02CA4FD0), ref: 02C7610A
                                                                                                        • RtlLeaveCriticalSection.NTDLL(02CA4FD0), ref: 02C7611B
                                                                                                        Strings
                                                                                                        • Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US), xrefs: 02C76124
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CriticalSection$EnterLeaveSleep
                                                                                                        • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                        • API String ID: 1566154052-1923541051
                                                                                                        • Opcode ID: fbe0f32de4d755171a04c6d4d4abbc774651e1a7215196ee4c1c1ee59751cabb
                                                                                                        • Instruction ID: 62822551c9437dd69dc0062e967396dd1a1aafbb675e69a12471e87313ed7038
                                                                                                        • Opcode Fuzzy Hash: fbe0f32de4d755171a04c6d4d4abbc774651e1a7215196ee4c1c1ee59751cabb
                                                                                                        • Instruction Fuzzy Hash: F811883388CF918FD72ADE20E85D3D67FA4AB2A748B2410DFE5855F151CB520896CBC1

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • GetVersion.KERNEL32 ref: 00402A46
                                                                                                          • Part of subcall function 00403B64: HeapCreate.KERNELBASE(00000000,00001000,00000000,00402A7F,00000000), ref: 00403B75
                                                                                                          • Part of subcall function 00403B64: HeapDestroy.KERNEL32 ref: 00403BB4
                                                                                                        • GetCommandLineA.KERNEL32 ref: 00402A94
                                                                                                        • GetStartupInfoA.KERNEL32(?), ref: 00402ABF
                                                                                                        • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00402AE2
                                                                                                          • Part of subcall function 00402B3B: ExitProcess.KERNEL32 ref: 00402B58
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3289387182.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3289387182.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_400000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                                                                        • String ID:
                                                                                                        • API String ID: 2057626494-0
                                                                                                        • Opcode ID: 81c04d43b3f46c58329c6832fe0805ef85b64df99fa32ea28edf2ad19d5a1781
                                                                                                        • Instruction ID: 5f87248e4510ca7a7a053da507506fe2897125482441b09741c869e2758f94b2
                                                                                                        • Opcode Fuzzy Hash: 81c04d43b3f46c58329c6832fe0805ef85b64df99fa32ea28edf2ad19d5a1781
                                                                                                        • Instruction Fuzzy Hash: BA214CB19006159ADB04AFA6DE49A6E7FA8EB04715F10413FF905BB2D1DB384900CA6C

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1131 2c72edd-2c72f1f WSASetLastError WSASocketA call 2c7fb10 WSAGetLastError 1134 2c72f21-2c72f25 1131->1134 1135 2c72f49-2c72f4f 1131->1135 1136 2c72f27-2c72f36 setsockopt 1134->1136 1137 2c72f3c-2c72f47 call 2c7fb10 1134->1137 1136->1137 1137->1135
                                                                                                        APIs
                                                                                                        • WSASetLastError.WS2_32(00000000), ref: 02C72EEE
                                                                                                        • WSASocketA.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02C72EFD
                                                                                                        • WSAGetLastError.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02C72F0C
                                                                                                        • setsockopt.WS2_32(00000000,00000029,0000001B,00000000,00000004), ref: 02C72F36
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$Socketsetsockopt
                                                                                                        • String ID:
                                                                                                        • API String ID: 2093263913-0
                                                                                                        • Opcode ID: d56d6f9001d376026810777d73a0fcb1b79a14ac3241cb545ce167cba028a7a7
                                                                                                        • Instruction ID: 2c1644d19c341f97492a32cfc7287d688032d98ee1a6d390861ecf94e2b084c7
                                                                                                        • Opcode Fuzzy Hash: d56d6f9001d376026810777d73a0fcb1b79a14ac3241cb545ce167cba028a7a7
                                                                                                        • Instruction Fuzzy Hash: C5018871A00214BBDB205F65DC88F5B7BA9DB857B1F008969FD18CB141D77189008BA0
                                                                                                        APIs
                                                                                                          • Part of subcall function 02C72D39: WSASetLastError.WS2_32(00000000), ref: 02C72D47
                                                                                                          • Part of subcall function 02C72D39: WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02C72D5C
                                                                                                        • WSASetLastError.WS2_32(00000000), ref: 02C72E6D
                                                                                                        • select.WS2_32(?,00000000,00000001,00000000,00000000), ref: 02C72E83
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$Sendselect
                                                                                                        • String ID: 3'
                                                                                                        • API String ID: 2958345159-280543908
                                                                                                        • Opcode ID: 5046cdde5dcb7931097332f1c8fea97a98ec44ae8e42b98d9cfd235c3c06e412
                                                                                                        • Instruction ID: 1555ed900559a8f3787b85d4d047817da8599c3354f3e9bea77253fbccd2b2af
                                                                                                        • Opcode Fuzzy Hash: 5046cdde5dcb7931097332f1c8fea97a98ec44ae8e42b98d9cfd235c3c06e412
                                                                                                        • Instruction Fuzzy Hash: 8731C0B0E00205AFDB10DF64D8557EEBBAAEF44394F10495ADC0497280E7719691DFA1
                                                                                                        APIs
                                                                                                        • GetModuleHandleA.KERNEL32(?), ref: 0040DFE4
                                                                                                        Strings
                                                                                                        • C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe, xrefs: 004022DD
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3289387182.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3289387182.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_400000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: HandleModule
                                                                                                        • String ID: C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                        • API String ID: 4139908857-2708294419
                                                                                                        • Opcode ID: a8ccf4f6f194123552154ccefedd04a9dca4a34a9352495c00ded27df422a770
                                                                                                        • Instruction ID: 70bba1d7ab309e35232e133f5f049113c7ad80513fa8ee7d2990465f1bb59648
                                                                                                        • Opcode Fuzzy Hash: a8ccf4f6f194123552154ccefedd04a9dca4a34a9352495c00ded27df422a770
                                                                                                        • Instruction Fuzzy Hash: FC31337180C642DBD7019EA08889AA5BB70FF02354F2405ABD9867F1D2C37E0047DB9E
                                                                                                        APIs
                                                                                                        • WSASetLastError.WS2_32(00000000), ref: 02C72AEA
                                                                                                        • connect.WS2_32(?,?,?), ref: 02C72AF5
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLastconnect
                                                                                                        • String ID: 3'
                                                                                                        • API String ID: 374722065-280543908
                                                                                                        • Opcode ID: 5c7cc0c3d346b2fcae318c16a3d1f5a08c3630a1a558c0282d753dfad82e07a0
                                                                                                        • Instruction ID: 5b41609a6aa59a4e0568a189bb7c9cef6f89402bbad3d890757455ca31ef9d82
                                                                                                        • Opcode Fuzzy Hash: 5c7cc0c3d346b2fcae318c16a3d1f5a08c3630a1a558c0282d753dfad82e07a0
                                                                                                        • Instruction Fuzzy Hash: 3721EB70E00204ABCF10EFB5D4547AEBBBAEF84364F10859DDC1993380EB7456019F91
                                                                                                        APIs
                                                                                                        • RegCreateKeyExA.KERNELBASE(80000002,Software\EJoin57,00000000,00000000), ref: 0040D4E1
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3289387182.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3289387182.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_400000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Create
                                                                                                        • String ID: <r$Software\EJoin57
                                                                                                        • API String ID: 2289755597-4250249883
                                                                                                        • Opcode ID: 49d8f6393cea4a6985a4e8145544f9395193ec1c480fecbb64e15fc5312a37cc
                                                                                                        • Instruction ID: ea55e36369bf80d74d9d9d4ee6e0f40662b5d4d3d7557532e19e37c52cd6174b
                                                                                                        • Opcode Fuzzy Hash: 49d8f6393cea4a6985a4e8145544f9395193ec1c480fecbb64e15fc5312a37cc
                                                                                                        • Instruction Fuzzy Hash: 17112D216092808AD7048B38AE72BB53FA49716340F48803BD093B62F3C23C484AEB1E
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: H_prolog
                                                                                                        • String ID:
                                                                                                        • API String ID: 3519838083-0
                                                                                                        • Opcode ID: 813d17c8dfc62331be713b3850c04341f9f5e20d2d66a9a80a6e5cff14902125
                                                                                                        • Instruction ID: 7e2321675f92c041ca89fbe142b25721d31e3a7726a32ffb576e8b06546511a6
                                                                                                        • Opcode Fuzzy Hash: 813d17c8dfc62331be713b3850c04341f9f5e20d2d66a9a80a6e5cff14902125
                                                                                                        • Instruction Fuzzy Hash: F8515AB1A04256DFCB09DF68D4557AABBB1FF48320F14819EE8299B380D774DA10DFA1
                                                                                                        APIs
                                                                                                        • InterlockedIncrement.KERNEL32(?), ref: 02C736A7
                                                                                                          • Part of subcall function 02C72420: InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02C72432
                                                                                                          • Part of subcall function 02C72420: PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02C72445
                                                                                                          • Part of subcall function 02C72420: RtlEnterCriticalSection.NTDLL(?), ref: 02C72454
                                                                                                          • Part of subcall function 02C72420: InterlockedExchange.KERNEL32(?,00000001), ref: 02C72469
                                                                                                          • Part of subcall function 02C72420: RtlLeaveCriticalSection.NTDLL(?), ref: 02C72470
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Interlocked$CriticalExchangeSection$CompareCompletionEnterIncrementLeavePostQueuedStatus
                                                                                                        • String ID:
                                                                                                        • API String ID: 1601054111-0
                                                                                                        • Opcode ID: e6db1bb1e0e3d0eb597b519a4ef54388413ff107d1b49348a502d7ff3f7c0afa
                                                                                                        • Instruction ID: db514006ab6812a12d6dd4e45759dc7934cf5c3e0606eec70569d94845cc5339
                                                                                                        • Opcode Fuzzy Hash: e6db1bb1e0e3d0eb597b519a4ef54388413ff107d1b49348a502d7ff3f7c0afa
                                                                                                        • Instruction Fuzzy Hash: 8F11E3B5100288ABDF218F14CD89FAA3BA9EF84354F108556FE52CB290CB74D960EB94
                                                                                                        APIs
                                                                                                        • __beginthreadex.LIBCMT ref: 02C81106
                                                                                                        • CloseHandle.KERNEL32(?,?,?,?,?,00000002,02C79985,00000000), ref: 02C81137
                                                                                                        • ResumeThread.KERNELBASE(?,?,?,?,?,00000002,02C79985,00000000), ref: 02C81145
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseHandleResumeThread__beginthreadex
                                                                                                        • String ID:
                                                                                                        • API String ID: 1685284544-0
                                                                                                        • Opcode ID: a0495afd8e2cec864c46360ce27a7256e4b2b3673bbc7d451913239f8f84efd2
                                                                                                        • Instruction ID: 78d6551f6966c790aaa03ee0692df4231e6ed151244ed7e2aa7aeeddac5f9bca
                                                                                                        • Opcode Fuzzy Hash: a0495afd8e2cec864c46360ce27a7256e4b2b3673bbc7d451913239f8f84efd2
                                                                                                        • Instruction Fuzzy Hash: 6FF068712402006BD720AE58DC84FA573E8AF88729F18456AF558D7280C7B1A8529AD0
                                                                                                        APIs
                                                                                                        • lstrcmpiW.KERNELBASE(?,/chk), ref: 0040DCB5
                                                                                                        Strings
                                                                                                        • C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe, xrefs: 0040DC95
                                                                                                        • /chk, xrefs: 0040D161
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3289387182.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3289387182.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_400000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: lstrcmpi
                                                                                                        • String ID: /chk$C:\Users\user\AppData\Local\Rollsoft Video Joiner 13.1.3\envideojoiner2.exe
                                                                                                        • API String ID: 1586166983-3943429552
                                                                                                        • Opcode ID: dbb85078f658ed78ed76f49e3a9fa5297b87ed9aa4cdc2bee0128ec45ce40bdd
                                                                                                        • Instruction ID: cf161d19308e2caf2a1307000ce0c8f4cb08502f2fc14fceedfad89ba1a35aa6
                                                                                                        • Opcode Fuzzy Hash: dbb85078f658ed78ed76f49e3a9fa5297b87ed9aa4cdc2bee0128ec45ce40bdd
                                                                                                        • Instruction Fuzzy Hash: 8BE04F30B08200EFEB0097A48E09D247AB09B087007254073F846F60F2C27C9E19B60E
                                                                                                        APIs
                                                                                                        • InterlockedIncrement.KERNEL32(02CA529C), ref: 02C71ABA
                                                                                                        • WSAStartup.WS2_32(00000002,00000000), ref: 02C71ACB
                                                                                                        • InterlockedExchange.KERNEL32(02CA52A0,00000000), ref: 02C71AD7
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Interlocked$ExchangeIncrementStartup
                                                                                                        • String ID:
                                                                                                        • API String ID: 1856147945-0
                                                                                                        • Opcode ID: 78a3989d4e66176141a57481380194b427067682282f8dfa7d4341b83d2422e9
                                                                                                        • Instruction ID: f0d684aa607fcf690eb5826aaf02451307a8a6e60911e734a526a58b7a92989e
                                                                                                        • Opcode Fuzzy Hash: 78a3989d4e66176141a57481380194b427067682282f8dfa7d4341b83d2422e9
                                                                                                        • Instruction Fuzzy Hash: 35D05E71D842085FE22166A0AD1FB78776CD705766FC00761FE69C41C0EA92652085E6
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3289387182.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3289387182.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_400000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Close
                                                                                                        • String ID: <r
                                                                                                        • API String ID: 3535843008-2351004432
                                                                                                        • Opcode ID: 04bcf45ca3d9a8b5df1aa47237d05bf3b02016319368343115f66ed35c6bd087
                                                                                                        • Instruction ID: bfd621df361124f1720c87da01caaa29f81cd403ed976757d518f1924915ca5d
                                                                                                        • Opcode Fuzzy Hash: 04bcf45ca3d9a8b5df1aa47237d05bf3b02016319368343115f66ed35c6bd087
                                                                                                        • Instruction Fuzzy Hash: A0F096652151814BD7498B2CAEB25B43FF5E346350B48407ED093A73F3D63C0806EB1D
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3289387182.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3289387182.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_400000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CopyFile
                                                                                                        • String ID: \
                                                                                                        • API String ID: 1304948518-2967466578
                                                                                                        • Opcode ID: cce7f3181b2f709a4caf7ee746d72f85115162cbcb32a16f4a39c0e6116b0b02
                                                                                                        • Instruction ID: 41995646df0deb7092f404151defe8b1a217dbd9e4abbd225dea5ed0e3ede67a
                                                                                                        • Opcode Fuzzy Hash: cce7f3181b2f709a4caf7ee746d72f85115162cbcb32a16f4a39c0e6116b0b02
                                                                                                        • Instruction Fuzzy Hash: 90E02C32C0A208DAEB086AF00E4E6EE36C48B00700F38847FC40AF20D2C57C804DAA0F
                                                                                                        APIs
                                                                                                        • RegSetValueExA.KERNELBASE(?,rs_video_joiner_i57), ref: 00401F94
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3289387182.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3289387182.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_400000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Value
                                                                                                        • String ID: rs_video_joiner_i57
                                                                                                        • API String ID: 3702945584-2992775179
                                                                                                        • Opcode ID: aa929384cbba4cb77d66d5f5fcfe1111b492b19b427668839c8acd4942386b52
                                                                                                        • Instruction ID: 78f9ddd11882b47fc7129756d57562c2773a374d06d627f6ca23abab2d45a56c
                                                                                                        • Opcode Fuzzy Hash: aa929384cbba4cb77d66d5f5fcfe1111b492b19b427668839c8acd4942386b52
                                                                                                        • Instruction Fuzzy Hash: ECB09235544016DFCB252B408F08BE87A71AB18309F2200E2E286300B087394F62AE0E
                                                                                                        APIs
                                                                                                        • __EH_prolog.LIBCMT ref: 02C74BF2
                                                                                                          • Part of subcall function 02C71BA7: __EH_prolog.LIBCMT ref: 02C71BAC
                                                                                                          • Part of subcall function 02C71BA7: RtlEnterCriticalSection.NTDLL ref: 02C71BBC
                                                                                                          • Part of subcall function 02C71BA7: RtlLeaveCriticalSection.NTDLL ref: 02C71BEA
                                                                                                          • Part of subcall function 02C71BA7: RtlEnterCriticalSection.NTDLL ref: 02C71C13
                                                                                                          • Part of subcall function 02C71BA7: RtlLeaveCriticalSection.NTDLL ref: 02C71C56
                                                                                                          • Part of subcall function 02C7D0F7: __EH_prolog.LIBCMT ref: 02C7D0FC
                                                                                                          • Part of subcall function 02C7D0F7: InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C7D17B
                                                                                                        • InterlockedExchange.KERNEL32(?,00000000), ref: 02C74CF2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CriticalSection$H_prolog$EnterExchangeInterlockedLeave
                                                                                                        • String ID:
                                                                                                        • API String ID: 1927618982-0
                                                                                                        • Opcode ID: bc33897d8e286e9daadff047053c50d161a28002796e1dcaad610a111b0943d2
                                                                                                        • Instruction ID: f58f7163c5dbe2e4d52f2dff2b8e6f861658c529e4d74cfe73316451a424193b
                                                                                                        • Opcode Fuzzy Hash: bc33897d8e286e9daadff047053c50d161a28002796e1dcaad610a111b0943d2
                                                                                                        • Instruction Fuzzy Hash: 955124B1D04248DFDB15DFA8C884AEEFBB5AF58314F1481AAE805AB351DB309A04DF91
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3289387182.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3289387182.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_400000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: lstrcmpi
                                                                                                        • String ID: ~i.
                                                                                                        • API String ID: 1586166983-500799757
                                                                                                        • Opcode ID: cdecbfaca4040a4a51a9532b0369784fa66ec37da9a95880829cfdb56f9a39fa
                                                                                                        • Instruction ID: 32995aba3e5b71408087f5b9148dc05e1571ab1fc75c1d4084ada92796fbcb00
                                                                                                        • Opcode Fuzzy Hash: cdecbfaca4040a4a51a9532b0369784fa66ec37da9a95880829cfdb56f9a39fa
                                                                                                        • Instruction Fuzzy Hash: 7C31B134819619CBDB10EF28EE847E977B0FB06341F1544B6D859B72A2C7388E4ADB4C
                                                                                                        APIs
                                                                                                        • WSASetLastError.WS2_32(00000000), ref: 02C72D47
                                                                                                        • WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02C72D5C
                                                                                                          • Part of subcall function 02C79505: WSAGetLastError.WS2_32(00000000,?,?,02C72A51), ref: 02C79513
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$Send
                                                                                                        • String ID:
                                                                                                        • API String ID: 1282938840-0
                                                                                                        • Opcode ID: 8b08924de39bd60f51dc3a2f264d83915e2407b3945983493b432b363b4199b5
                                                                                                        • Instruction ID: 52af0d49054323634ed3f7d7be0987449415f1212e8f861522a430e5dd9f7313
                                                                                                        • Opcode Fuzzy Hash: 8b08924de39bd60f51dc3a2f264d83915e2407b3945983493b432b363b4199b5
                                                                                                        • Instruction Fuzzy Hash: C101A7B5500205EFD7205FA5D88496BBBFDFF857E4720092EEC9983200EB709D00DB62
                                                                                                        APIs
                                                                                                        • WSASetLastError.WS2_32(00000000), ref: 02C77402
                                                                                                        • shutdown.WS2_32(?,00000002), ref: 02C7740B
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLastshutdown
                                                                                                        • String ID:
                                                                                                        • API String ID: 1920494066-0
                                                                                                        • Opcode ID: e377c7f80b7a80725979f62b62d743c8a500a6ab6753ff18672d9071282b5282
                                                                                                        • Instruction ID: d113484358dada6193f7ccb8746f540ff4b4c6bc279b1b681d5670e21e85b8dd
                                                                                                        • Opcode Fuzzy Hash: e377c7f80b7a80725979f62b62d743c8a500a6ab6753ff18672d9071282b5282
                                                                                                        • Instruction Fuzzy Hash: 4BF0BE31A043148FC710AF28D818B5ABBE5EF493A5F11892DED9997380D730AC10CFA1
                                                                                                        APIs
                                                                                                        • HeapCreate.KERNELBASE(00000000,00001000,00000000,00402A7F,00000000), ref: 00403B75
                                                                                                          • Part of subcall function 00403A1C: GetVersionExA.KERNEL32 ref: 00403A3B
                                                                                                        • HeapDestroy.KERNEL32 ref: 00403BB4
                                                                                                          • Part of subcall function 00403F3B: HeapAlloc.KERNEL32(00000000,00000140,00403B9D,000003F8), ref: 00403F48
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3289387182.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3289387182.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_400000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Heap$AllocCreateDestroyVersion
                                                                                                        • String ID:
                                                                                                        • API String ID: 2507506473-0
                                                                                                        • Opcode ID: 41655e9e9c0e703031797a4b7b8f832f06af8b7de0b6b38e25141203e3b9edaa
                                                                                                        • Instruction ID: 13181fdbc77bd6b5762d4953551df96dffaf81345f3f43d3ea23e6f05a00c699
                                                                                                        • Opcode Fuzzy Hash: 41655e9e9c0e703031797a4b7b8f832f06af8b7de0b6b38e25141203e3b9edaa
                                                                                                        • Instruction Fuzzy Hash: 58F065706547029ADB101F319E4572A3EA89B4075BF10447FFD00F51D1EFBC9784951D
                                                                                                        APIs
                                                                                                        • CloseServiceHandle.SECHOST ref: 0040D8A1
                                                                                                        • CloseServiceHandle.ADVAPI32(?), ref: 0040D8A6
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3289387182.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3289387182.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_400000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseHandleService
                                                                                                        • String ID:
                                                                                                        • API String ID: 1725840886-0
                                                                                                        • Opcode ID: a77d7338ccab985511ab3b3f95adeadaca808204e128c4a46172c1d876d9e569
                                                                                                        • Instruction ID: 9119dcc9fe0a7889d872c854232ef555ce165dced8004ab99a3ec1719cce3eff
                                                                                                        • Opcode Fuzzy Hash: a77d7338ccab985511ab3b3f95adeadaca808204e128c4a46172c1d876d9e569
                                                                                                        • Instruction Fuzzy Hash: 8FC08031E08238F7C51026D14D445F97E14B719371F241173B085720D1C57B184978A9
                                                                                                        APIs
                                                                                                        • __EH_prolog.LIBCMT ref: 02C7511E
                                                                                                          • Part of subcall function 02C73D7E: htons.WS2_32(?), ref: 02C73DA2
                                                                                                          • Part of subcall function 02C73D7E: htonl.WS2_32(00000000), ref: 02C73DB9
                                                                                                          • Part of subcall function 02C73D7E: htonl.WS2_32(00000000), ref: 02C73DC0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: htonl$H_prologhtons
                                                                                                        • String ID:
                                                                                                        • API String ID: 4039807196-0
                                                                                                        • Opcode ID: 3e9f0f5a3efa4b1ce6bcdb1dcda89200c0942a056aefa31ac3fcd698e83aa5a2
                                                                                                        • Instruction ID: c519daf3e2492c43d4a041583751c732f34f610515fb9f9015ddc21f9bbb7cab
                                                                                                        • Opcode Fuzzy Hash: 3e9f0f5a3efa4b1ce6bcdb1dcda89200c0942a056aefa31ac3fcd698e83aa5a2
                                                                                                        • Instruction Fuzzy Hash: 9C8146B1D0424ECECF05DFA8D480AEEBBB5EF48314F20819AD854B7240EB765A05CFA5
                                                                                                        APIs
                                                                                                        • __EH_prolog.LIBCMT ref: 02C7D9C5
                                                                                                          • Part of subcall function 02C71A01: TlsGetValue.KERNEL32 ref: 02C71A0A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: H_prologValue
                                                                                                        • String ID:
                                                                                                        • API String ID: 3700342317-0
                                                                                                        • Opcode ID: 2a1a63e7ee7d4a359d2658bd60383e1597ba4408439efcfd5078afe920b53a0d
                                                                                                        • Instruction ID: ab9f38a03134dd3df95dfc942f2792f083d4dc5983abd990ef7bae263394fcad
                                                                                                        • Opcode Fuzzy Hash: 2a1a63e7ee7d4a359d2658bd60383e1597ba4408439efcfd5078afe920b53a0d
                                                                                                        • Instruction Fuzzy Hash: 092131B2944209AFDB04DF99D940AEEBBF9FF48310F14415EE915A7240D771AA00DBA1
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002CA8000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA8000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2ca8000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FileWrite
                                                                                                        • String ID:
                                                                                                        • API String ID: 3934441357-0
                                                                                                        • Opcode ID: 23281af264f632eaa9850956d020a2c3ed6a858dc1e8d07cb5c7f38d63b76428
                                                                                                        • Instruction ID: fddd80a3949f9fedc8a3ea83b6e8206491ee77e32377584020bef84718ca7add
                                                                                                        • Opcode Fuzzy Hash: 23281af264f632eaa9850956d020a2c3ed6a858dc1e8d07cb5c7f38d63b76428
                                                                                                        • Instruction Fuzzy Hash: AA01C4B255C328ABD2193F59AC4AAFABFDCEB057B0F41052DE7C581280EA758440D6CB
                                                                                                        APIs
                                                                                                        • LoadLibraryExA.KERNELBASE(?,00000000), ref: 0040D448
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3289387182.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3289387182.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_400000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: LibraryLoad
                                                                                                        • String ID:
                                                                                                        • API String ID: 1029625771-0
                                                                                                        • Opcode ID: 705f5d63ccff4b4fd15790c7cbc95a1cb88764c0ff8242414ebb9e007b5bc504
                                                                                                        • Instruction ID: 74a3dde775db4b1b23975d07c450329c087a80aae67a36d6290052c9d6752c0f
                                                                                                        • Opcode Fuzzy Hash: 705f5d63ccff4b4fd15790c7cbc95a1cb88764c0ff8242414ebb9e007b5bc504
                                                                                                        • Instruction Fuzzy Hash: 73112D35E04215CFDB18DFA8D894BEDB3B0FF09700F15406AE8167B290C378A846CB19
                                                                                                        APIs
                                                                                                        • __EH_prolog.LIBCMT ref: 02C7D555
                                                                                                          • Part of subcall function 02C726DB: RtlEnterCriticalSection.NTDLL(?), ref: 02C72706
                                                                                                          • Part of subcall function 02C726DB: CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02C7272B
                                                                                                          • Part of subcall function 02C726DB: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02C93163), ref: 02C72738
                                                                                                          • Part of subcall function 02C726DB: SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000), ref: 02C72778
                                                                                                          • Part of subcall function 02C726DB: RtlLeaveCriticalSection.NTDLL(?), ref: 02C727D9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                                                        • String ID:
                                                                                                        • API String ID: 4293676635-0
                                                                                                        • Opcode ID: 45f65149e790ca73e90cc73db2bb765320db019c7d1e8ba06e02212e3a910d20
                                                                                                        • Instruction ID: 358e2925d7dcb1326e4da3e4a78c57639037e18ae8c4c8957d5943aabcf04e37
                                                                                                        • Opcode Fuzzy Hash: 45f65149e790ca73e90cc73db2bb765320db019c7d1e8ba06e02212e3a910d20
                                                                                                        • Instruction Fuzzy Hash: E2019EB1901B089FC728CF1AD544946FBE5EF88714B15C6AE94498B722E771DA40CF94
                                                                                                        APIs
                                                                                                        • __EH_prolog.LIBCMT ref: 02C7D334
                                                                                                          • Part of subcall function 02C827B5: _malloc.LIBCMT ref: 02C827CD
                                                                                                          • Part of subcall function 02C7D550: __EH_prolog.LIBCMT ref: 02C7D555
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: H_prolog$_malloc
                                                                                                        • String ID:
                                                                                                        • API String ID: 4254904621-0
                                                                                                        • Opcode ID: ba8c44c93886c004061ea020c7fd6eca5b8cecfcf136b0867d9d49892ee35f03
                                                                                                        • Instruction ID: 4b8f48b01b7dee769be7d50f538b87e9591d5d354b606d416a26ca7d77e5d88d
                                                                                                        • Opcode Fuzzy Hash: ba8c44c93886c004061ea020c7fd6eca5b8cecfcf136b0867d9d49892ee35f03
                                                                                                        • Instruction Fuzzy Hash: 9BE08CB1A51145ABDF09EFA8D80473EB7B2EF44300F0081ADA80ED2240EF308A009A55
                                                                                                        APIs
                                                                                                          • Part of subcall function 02C848BA: __getptd_noexit.LIBCMT ref: 02C848BB
                                                                                                          • Part of subcall function 02C848BA: __amsg_exit.LIBCMT ref: 02C848C8
                                                                                                          • Part of subcall function 02C82493: __getptd_noexit.LIBCMT ref: 02C82497
                                                                                                          • Part of subcall function 02C82493: __freeptd.LIBCMT ref: 02C824B1
                                                                                                          • Part of subcall function 02C82493: RtlExitUserThread.NTDLL(?,00000000,?,02C82473,00000000), ref: 02C824BA
                                                                                                        • __XcptFilter.LIBCMT ref: 02C8247F
                                                                                                          • Part of subcall function 02C87944: __getptd_noexit.LIBCMT ref: 02C87948
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: __getptd_noexit$ExitFilterThreadUserXcpt__amsg_exit__freeptd
                                                                                                        • String ID:
                                                                                                        • API String ID: 1405322794-0
                                                                                                        • Opcode ID: 15706fd06d76f7e27ba2261aee9374c947a0d67ed3fe852c3e6ca756af5b605a
                                                                                                        • Instruction ID: 361c8b182507551715dbabf0e5af4256369e7f01dcd6935d7c4faa4d69b94dfe
                                                                                                        • Opcode Fuzzy Hash: 15706fd06d76f7e27ba2261aee9374c947a0d67ed3fe852c3e6ca756af5b605a
                                                                                                        • Instruction Fuzzy Hash: CCE0ECB5900640AFEB08BBB0D909E2E77A6AF44319F204499E1019B271DA74A954FE25
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3289387182.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3289387182.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_400000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ExitProcess
                                                                                                        • String ID:
                                                                                                        • API String ID: 621844428-0
                                                                                                        • Opcode ID: f4c7f6812c026c0efc1d71a2fea8f1aedbe58f6a3f2124c643cf4ddd06f32609
                                                                                                        • Instruction ID: 2ce3d1b047e19954d457798819b1cd03f599965d5a26be1f357e0228cfddb3c3
                                                                                                        • Opcode Fuzzy Hash: f4c7f6812c026c0efc1d71a2fea8f1aedbe58f6a3f2124c643cf4ddd06f32609
                                                                                                        • Instruction Fuzzy Hash: 56D0A7B0C08100A7E500A790DDC477936785300310F2459BFE256F00F1C57D8589A91F
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3289387182.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3289387182.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_400000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Open
                                                                                                        • String ID:
                                                                                                        • API String ID: 71445658-0
                                                                                                        • Opcode ID: b93b49d01fa4c830a6ef7886f5032051a3d53c1261d00495828595b2d44d552d
                                                                                                        • Instruction ID: 9ee259165f80672571936d1d6569961c923f5e490a8d6e4b38c8f95b33ca4667
                                                                                                        • Opcode Fuzzy Hash: b93b49d01fa4c830a6ef7886f5032051a3d53c1261d00495828595b2d44d552d
                                                                                                        • Instruction Fuzzy Hash: 88D0C770908119E9D704DFE1D6086BE76787B54340F204577D403F51C0D778DB0B656B
                                                                                                        APIs
                                                                                                        • CreateDirectoryA.KERNELBASE ref: 0040D5F7
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3289387182.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3289387182.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_400000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateDirectory
                                                                                                        • String ID:
                                                                                                        • API String ID: 4241100979-0
                                                                                                        • Opcode ID: 8a0379712529f6dad1c843263d653d85ab262f5e7f2cd2af4593d0b87ec1d7d5
                                                                                                        • Instruction ID: 57fb1c4192bafd8e31b25f302f86533846d6a37f15f91ace5addab462b0b1c3d
                                                                                                        • Opcode Fuzzy Hash: 8a0379712529f6dad1c843263d653d85ab262f5e7f2cd2af4593d0b87ec1d7d5
                                                                                                        • Instruction Fuzzy Hash: A1C02B308C5824DBC11467F0CE08CDD71380F0D300B2100736502750E18BBC044927FF
                                                                                                        APIs
                                                                                                        • RegQueryValueExA.KERNELBASE ref: 00401D89
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3289387182.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3289387182.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_400000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: QueryValue
                                                                                                        • String ID:
                                                                                                        • API String ID: 3660427363-0
                                                                                                        • Opcode ID: 6a1fd6280eae81fd9c4937f4c2d87b96841eccba574c1eacceb3c73394adcbe8
                                                                                                        • Instruction ID: 29795bed555ad3c548b91b967c811654ed3b1c78a56d9c70e381ac9766d9f041
                                                                                                        • Opcode Fuzzy Hash: 6a1fd6280eae81fd9c4937f4c2d87b96841eccba574c1eacceb3c73394adcbe8
                                                                                                        • Instruction Fuzzy Hash: 06B09220E08102EADB150FB45E0973A3A656A543423218836D053F10A0DA39950ABA1E
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3289387182.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3289387182.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_400000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ManagerOpen
                                                                                                        • String ID:
                                                                                                        • API String ID: 1889721586-0
                                                                                                        • Opcode ID: ae3d947bf77a5c0d9795e844eacd991ea23476f03afa86d92a614efe0bd1dbc7
                                                                                                        • Instruction ID: 15dbfb8828e9dc7454bbb02f06c4ff597fe0de057a98135adb5a2b11d95e3b53
                                                                                                        • Opcode Fuzzy Hash: ae3d947bf77a5c0d9795e844eacd991ea23476f03afa86d92a614efe0bd1dbc7
                                                                                                        • Instruction Fuzzy Hash: 86B092B080800AEECB400FD04ED883939ADA505358731847AE147B00C0C638098EE62F
                                                                                                        APIs
                                                                                                        • RegSetValueExA.KERNELBASE(?,rs_video_joiner_i57), ref: 00401F94
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3289387182.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3289387182.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_400000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Value
                                                                                                        • String ID:
                                                                                                        • API String ID: 3702945584-0
                                                                                                        • Opcode ID: 2d4f3d666a848a099bc2b4b8b0cc1c85f54d0b3bbb4bbc30c3e612b9c0eea98a
                                                                                                        • Instruction ID: c1ed8e5456dad7c59eec57dfbf9c4762737b9ba0c2ad93b4a98ac0b53f1ceff1
                                                                                                        • Opcode Fuzzy Hash: 2d4f3d666a848a099bc2b4b8b0cc1c85f54d0b3bbb4bbc30c3e612b9c0eea98a
                                                                                                        • Instruction Fuzzy Hash: AAB092710014609BC7565B599F08A96BBB8FB8D726F5185A9E746A047087394B209E08
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3289387182.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3289387182.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_400000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CopyFile
                                                                                                        • String ID:
                                                                                                        • API String ID: 1304948518-0
                                                                                                        • Opcode ID: 42d0b0d83b1cd39fdc642294f13eb259c5883c2a8b77e5acfde3a31b550dd6a8
                                                                                                        • Instruction ID: 06cd0213cdd44a6fc7f1e203c87143440e57960a1a4bed3431c72430acdd933a
                                                                                                        • Opcode Fuzzy Hash: 42d0b0d83b1cd39fdc642294f13eb259c5883c2a8b77e5acfde3a31b550dd6a8
                                                                                                        • Instruction Fuzzy Hash: C2A022A0808000FEC80003C00E0FB223008830A300F20003BB203F00E0883C008EB23F
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3289387182.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3289387182.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_400000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Close
                                                                                                        • String ID:
                                                                                                        • API String ID: 3535843008-0
                                                                                                        • Opcode ID: e82bfe3a0a1dc3a7add6e18b2a9954348e5e66a206366d321a6557aee3368cbb
                                                                                                        • Instruction ID: bd5d34bb3c287b30cc1967a0b67051d20cf11d01f46343c69b5697ac7ec53bcb
                                                                                                        • Opcode Fuzzy Hash: e82bfe3a0a1dc3a7add6e18b2a9954348e5e66a206366d321a6557aee3368cbb
                                                                                                        • Instruction Fuzzy Hash: 9F900231B58510D6D9500E955B095242551654471132240376682700E1897D04096E5F
                                                                                                        APIs
                                                                                                        • Sleep.KERNELBASE(000007D0), ref: 0040DF4E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3289387182.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3289387182.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_400000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Sleep
                                                                                                        • String ID:
                                                                                                        • API String ID: 3472027048-0
                                                                                                        • Opcode ID: a0bd72111fd43e2b7948f54f8195d16a1a2326a91b37d24d51dbcfa30282de16
                                                                                                        • Instruction ID: 061902d538c92fb4f5a7d084cadb34b51e448bfa59821e9886e46fbbdcbeb8f9
                                                                                                        • Opcode Fuzzy Hash: a0bd72111fd43e2b7948f54f8195d16a1a2326a91b37d24d51dbcfa30282de16
                                                                                                        • Instruction Fuzzy Hash: 16016D3148C7916AC7235BB48C066E17FA0ED06A2436904BFD8D363593C33A544BC39A
                                                                                                        APIs
                                                                                                        • VirtualAlloc.KERNELBASE(00000000,00000040,00003000,00000040,00409068), ref: 0040DF5B
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3289387182.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3289387182.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_400000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AllocVirtual
                                                                                                        • String ID:
                                                                                                        • API String ID: 4275171209-0
                                                                                                        • Opcode ID: 8c95cb8918c52efffac2acc4e4f3e6f79c21d7826d0484253c923c296974f192
                                                                                                        • Instruction ID: 71d147f513e65b0a9dc57c4bb3c1b8a85745003c18582e100fd0e83ede7605d6
                                                                                                        • Opcode Fuzzy Hash: 8c95cb8918c52efffac2acc4e4f3e6f79c21d7826d0484253c923c296974f192
                                                                                                        • Instruction Fuzzy Hash: 56019274D0420AEBDB00EEA9CC95FDABBB4EB00710F00415AF511B72D0C3349946DB4A
                                                                                                        APIs
                                                                                                          • Part of subcall function 02C80610: OpenEventA.KERNEL32(00100002,00000000,00000000,E652DFBB), ref: 02C806B0
                                                                                                          • Part of subcall function 02C80610: CloseHandle.KERNEL32(00000000), ref: 02C806C5
                                                                                                          • Part of subcall function 02C80610: ResetEvent.KERNEL32(00000000,E652DFBB), ref: 02C806CF
                                                                                                          • Part of subcall function 02C80610: CloseHandle.KERNEL32(00000000,E652DFBB), ref: 02C80704
                                                                                                        • TlsSetValue.KERNEL32(0000002B,?), ref: 02C811AA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3290906324.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_2c71000_envideojoiner2.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseEventHandle$OpenResetValue
                                                                                                        • String ID:
                                                                                                        • API String ID: 1556185888-0
                                                                                                        • Opcode ID: a867d67ee1d06560011e5e57ed19389774d0884b6941359f4e0fa8438551ad36
                                                                                                        • Instruction ID: c61d078289d2c4888153b5b8ab0ceca58166f48b60e6831c3167c551dc4d13d7
                                                                                                        • Opcode Fuzzy Hash: a867d67ee1d06560011e5e57ed19389774d0884b6941359f4e0fa8438551ad36
                                                                                                        • Instruction Fuzzy Hash: 4801A271A44204EFD710DF98DC09B5ABBECFB05679F10872AF829E3380D77169008AE0
                                                                                                        APIs
                                                                                                        • Sleep.KERNELBASE(000007D0), ref: 0040DF4E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3289387182.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3289387182.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_400000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Sleep
                                                                                                        • String ID:
                                                                                                        • API String ID: 3472027048-0
                                                                                                        • Opcode ID: 8d884d157cb2209c18396d0f9b021025555e7db2825dc86a2879330954069a2b
                                                                                                        • Instruction ID: 4f32d827f93f54d6b40f85a07ec142b6f3cf01d0e70c7e11a7dfeeb4b8741081
                                                                                                        • Opcode Fuzzy Hash: 8d884d157cb2209c18396d0f9b021025555e7db2825dc86a2879330954069a2b
                                                                                                        • Instruction Fuzzy Hash: 38A00260D8D601D6DA485BE06F0A73536307F40711F236077A647744D14A7C650EEF5F
                                                                                                        APIs
                                                                                                        • sqlite3_malloc.SQLITE3 ref: 609674C6
                                                                                                          • Part of subcall function 60916FBA: sqlite3_initialize.SQLITE3(60912743,?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5), ref: 60916FC4
                                                                                                          • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                                                                          • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                                                                          • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                                                                        • sqlite3_step.SQLITE3 ref: 6096755A
                                                                                                        • sqlite3_malloc.SQLITE3 ref: 6096783A
                                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 609678A8
                                                                                                        • sqlite3_column_bytes.SQLITE3 ref: 609678E8
                                                                                                        • sqlite3_column_blob.SQLITE3 ref: 60967901
                                                                                                        • sqlite3_column_int64.SQLITE3 ref: 6096791A
                                                                                                        • sqlite3_column_int64.SQLITE3 ref: 60967931
                                                                                                        • sqlite3_column_int64.SQLITE3 ref: 60967950
                                                                                                        • sqlite3_step.SQLITE3 ref: 609679C3
                                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 60967AA9
                                                                                                        • sqlite3_step.SQLITE3 ref: 60967AB4
                                                                                                        • sqlite3_column_int.SQLITE3 ref: 60967AC7
                                                                                                        • sqlite3_reset.SQLITE3 ref: 60967AD4
                                                                                                        • sqlite3_bind_int.SQLITE3 ref: 60967B89
                                                                                                        • sqlite3_step.SQLITE3 ref: 60967B94
                                                                                                        • sqlite3_column_int64.SQLITE3 ref: 60967BB0
                                                                                                        • sqlite3_column_int64.SQLITE3 ref: 60967BCF
                                                                                                        • sqlite3_column_int64.SQLITE3 ref: 60967BE6
                                                                                                        • sqlite3_column_bytes.SQLITE3 ref: 60967C05
                                                                                                        • sqlite3_column_blob.SQLITE3 ref: 60967C1E
                                                                                                          • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED50
                                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 60967C72
                                                                                                        • sqlite3_step.SQLITE3 ref: 60967C7D
                                                                                                        • memcmp.MSVCRT ref: 60967D4C
                                                                                                        • sqlite3_free.SQLITE3 ref: 60967D69
                                                                                                        • sqlite3_free.SQLITE3 ref: 60967D74
                                                                                                        • sqlite3_free.SQLITE3 ref: 60967FF7
                                                                                                        • sqlite3_free.SQLITE3 ref: 60968002
                                                                                                          • Part of subcall function 609634F0: sqlite3_blob_reopen.SQLITE3 ref: 60963510
                                                                                                          • Part of subcall function 609634F0: sqlite3_blob_bytes.SQLITE3 ref: 609635A3
                                                                                                          • Part of subcall function 609634F0: sqlite3_malloc.SQLITE3 ref: 609635BB
                                                                                                          • Part of subcall function 609634F0: sqlite3_blob_read.SQLITE3 ref: 60963602
                                                                                                          • Part of subcall function 609634F0: sqlite3_free.SQLITE3 ref: 60963621
                                                                                                        • sqlite3_reset.SQLITE3 ref: 60967C93
                                                                                                          • Part of subcall function 60941C40: sqlite3_mutex_enter.SQLITE3 ref: 60941C58
                                                                                                          • Part of subcall function 60941C40: sqlite3_mutex_leave.SQLITE3 ref: 60941CBE
                                                                                                        • sqlite3_reset.SQLITE3 ref: 60967CA7
                                                                                                        • sqlite3_reset.SQLITE3 ref: 60968035
                                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 60967B72
                                                                                                          • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6096809D
                                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 609680C6
                                                                                                        • sqlite3_step.SQLITE3 ref: 609680D1
                                                                                                        • sqlite3_column_int.SQLITE3 ref: 609680F3
                                                                                                        • sqlite3_reset.SQLITE3 ref: 60968104
                                                                                                        • sqlite3_step.SQLITE3 ref: 60968139
                                                                                                        • sqlite3_column_int64.SQLITE3 ref: 60968151
                                                                                                        • sqlite3_reset.SQLITE3 ref: 6096818A
                                                                                                          • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED2B
                                                                                                          • Part of subcall function 6095ECA6: sqlite3_bind_value.SQLITE3 ref: 6095EDDF
                                                                                                        • sqlite3_reset.SQLITE3 ref: 609679E9
                                                                                                          • Part of subcall function 609160CD: sqlite3_realloc.SQLITE3 ref: 609160EF
                                                                                                        • sqlite3_column_bytes.SQLITE3 ref: 60967587
                                                                                                          • Part of subcall function 6091D5DC: sqlite3_value_bytes.SQLITE3 ref: 6091D5F4
                                                                                                        • sqlite3_column_blob.SQLITE3 ref: 60967572
                                                                                                          • Part of subcall function 6091D57E: sqlite3_value_blob.SQLITE3 ref: 6091D596
                                                                                                        • sqlite3_reset.SQLITE3 ref: 609675B7
                                                                                                        • sqlite3_bind_int.SQLITE3 ref: 60967641
                                                                                                        • sqlite3_step.SQLITE3 ref: 6096764C
                                                                                                        • sqlite3_column_int64.SQLITE3 ref: 6096766E
                                                                                                        • sqlite3_reset.SQLITE3 ref: 6096768B
                                                                                                        • sqlite3_bind_int.SQLITE3 ref: 6096754F
                                                                                                          • Part of subcall function 609256E5: sqlite3_bind_int64.SQLITE3 ref: 60925704
                                                                                                        • sqlite3_bind_int.SQLITE3 ref: 609690B2
                                                                                                        • sqlite3_bind_blob.SQLITE3 ref: 609690DB
                                                                                                        • sqlite3_step.SQLITE3 ref: 609690E6
                                                                                                        • sqlite3_reset.SQLITE3 ref: 609690F1
                                                                                                        • sqlite3_free.SQLITE3 ref: 60969102
                                                                                                        • sqlite3_free.SQLITE3 ref: 6096910D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_reset$sqlite3_step$sqlite3_column_int64sqlite3_free$sqlite3_bind_int64$sqlite3_bind_int$sqlite3_column_blobsqlite3_column_bytessqlite3_mallocsqlite3_mprintf$sqlite3_column_intsqlite3_mutex_leave$memcmpsqlite3_bind_blobsqlite3_bind_valuesqlite3_blob_bytessqlite3_blob_readsqlite3_blob_reopensqlite3_initializesqlite3_mutex_entersqlite3_prepare_v2sqlite3_reallocsqlite3_value_blobsqlite3_value_bytes
                                                                                                        • String ID: $d
                                                                                                        • API String ID: 2451604321-2084297493
                                                                                                        • Opcode ID: 8a4e51d2763d1baa8146902d495da2ef892242416c9706ebfa3093aedc646825
                                                                                                        • Instruction ID: 6b7ea73e19bc996eb6a422b8fcf26663d3cb25e4dd91ceba81a4d6a678ae72ab
                                                                                                        • Opcode Fuzzy Hash: 8a4e51d2763d1baa8146902d495da2ef892242416c9706ebfa3093aedc646825
                                                                                                        • Instruction Fuzzy Hash: 2CF2CF74A152288FDB54CF68C980B9EBBF2BF69304F1185A9E888A7341D774ED85CF41
                                                                                                        APIs
                                                                                                        • sqlite3_value_text.SQLITE3 ref: 6096A64C
                                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 6096A656
                                                                                                        • sqlite3_strnicmp.SQLITE3 ref: 6096A682
                                                                                                        • sqlite3_strnicmp.SQLITE3 ref: 6096A6BC
                                                                                                        • sqlite3_mprintf.SQLITE3 ref: 6096A6F9
                                                                                                        • sqlite3_malloc.SQLITE3 ref: 6096A754
                                                                                                        • sqlite3_step.SQLITE3 ref: 6096A969
                                                                                                        • sqlite3_free.SQLITE3 ref: 6096A9AC
                                                                                                        • sqlite3_finalize.SQLITE3 ref: 6096A9BB
                                                                                                        • sqlite3_strnicmp.SQLITE3 ref: 6096B04A
                                                                                                          • Part of subcall function 6096A38C: sqlite3_bind_int.SQLITE3 ref: 6096A3DE
                                                                                                          • Part of subcall function 6096A38C: sqlite3_step.SQLITE3 ref: 6096A435
                                                                                                          • Part of subcall function 6096A38C: sqlite3_reset.SQLITE3 ref: 6096A445
                                                                                                        • sqlite3_value_int.SQLITE3 ref: 6096B241
                                                                                                        • sqlite3_malloc.SQLITE3 ref: 6096B270
                                                                                                        • sqlite3_bind_null.SQLITE3 ref: 6096B2DF
                                                                                                        • sqlite3_step.SQLITE3 ref: 6096B2EA
                                                                                                        • sqlite3_reset.SQLITE3 ref: 6096B2F5
                                                                                                        • sqlite3_value_int.SQLITE3 ref: 6096B43B
                                                                                                        • sqlite3_value_text.SQLITE3 ref: 6096B530
                                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 6096B576
                                                                                                        • sqlite3_free.SQLITE3 ref: 6096B5F4
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_stepsqlite3_strnicmp$sqlite3_freesqlite3_mallocsqlite3_resetsqlite3_value_bytessqlite3_value_intsqlite3_value_text$sqlite3_bind_intsqlite3_bind_nullsqlite3_finalizesqlite3_mprintf
                                                                                                        • String ID: optimize
                                                                                                        • API String ID: 1540667495-3797040228
                                                                                                        • Opcode ID: ab382b16e3f59fac809a38361d516dac1e6c4c02a096abfb60effccae4f38c9b
                                                                                                        • Instruction ID: 15d53f9c7948a495e2c6926a79545eea34293df74e7a3e63ea56b3727437b729
                                                                                                        • Opcode Fuzzy Hash: ab382b16e3f59fac809a38361d516dac1e6c4c02a096abfb60effccae4f38c9b
                                                                                                        • Instruction Fuzzy Hash: 54B2F670A142198FEB14DF68C890B9DBBF6BF68304F1085A9E889AB351E774DD85CF41
                                                                                                        APIs
                                                                                                        • sqlite3_finalize.SQLITE3 ref: 60966178
                                                                                                        • sqlite3_free.SQLITE3 ref: 60966183
                                                                                                        • sqlite3_value_numeric_type.SQLITE3 ref: 609661AE
                                                                                                        • sqlite3_value_numeric_type.SQLITE3 ref: 609661DE
                                                                                                        • sqlite3_value_text.SQLITE3 ref: 60966236
                                                                                                        • sqlite3_value_int.SQLITE3 ref: 60966274
                                                                                                        • memcmp.MSVCRT ref: 6096639E
                                                                                                          • Part of subcall function 60940A5B: sqlite3_malloc.SQLITE3 ref: 60940AA1
                                                                                                          • Part of subcall function 60940A5B: sqlite3_free.SQLITE3 ref: 60940C1D
                                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60966B51
                                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60966B7D
                                                                                                          • Part of subcall function 609296AA: sqlite3_initialize.SQLITE3 ref: 609296B0
                                                                                                          • Part of subcall function 609296AA: sqlite3_vmprintf.SQLITE3 ref: 609296CA
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_freesqlite3_mprintfsqlite3_value_numeric_type$memcmpsqlite3_finalizesqlite3_initializesqlite3_mallocsqlite3_value_intsqlite3_value_textsqlite3_vmprintf
                                                                                                        • String ID: ASC$DESC$x
                                                                                                        • API String ID: 4082667235-1162196452
                                                                                                        • Opcode ID: 7264e4280a4ba67b830c3238f8418230a53be4a89f04bb086879d88682624c0f
                                                                                                        • Instruction ID: 01f4316cc9c65235d83944c747b96ccca9397e1276bdc6c450b31a73d7ca280a
                                                                                                        • Opcode Fuzzy Hash: 7264e4280a4ba67b830c3238f8418230a53be4a89f04bb086879d88682624c0f
                                                                                                        • Instruction Fuzzy Hash: AD921274A14319CFEB10CFA9C99079DBBB6BF69304F20816AD858AB342D774E985CF41
                                                                                                        APIs
                                                                                                        • sqlite3_bind_int64.SQLITE3(?,?), ref: 609693A5
                                                                                                        • sqlite3_step.SQLITE3(?,?), ref: 609693B0
                                                                                                        • sqlite3_column_int64.SQLITE3(?,?), ref: 609693DC
                                                                                                          • Part of subcall function 6096A2BD: sqlite3_bind_int64.SQLITE3 ref: 6096A322
                                                                                                          • Part of subcall function 6096A2BD: sqlite3_step.SQLITE3 ref: 6096A32D
                                                                                                          • Part of subcall function 6096A2BD: sqlite3_column_int.SQLITE3 ref: 6096A347
                                                                                                          • Part of subcall function 6096A2BD: sqlite3_reset.SQLITE3 ref: 6096A354
                                                                                                        • sqlite3_reset.SQLITE3(?,?), ref: 609693F3
                                                                                                        • sqlite3_malloc.SQLITE3(?), ref: 60969561
                                                                                                        • sqlite3_malloc.SQLITE3(?), ref: 6096958D
                                                                                                        • sqlite3_step.SQLITE3(?), ref: 609695D2
                                                                                                        • sqlite3_column_int64.SQLITE3(?), ref: 609695EA
                                                                                                        • sqlite3_reset.SQLITE3(?), ref: 60969604
                                                                                                        • sqlite3_realloc.SQLITE3(?), ref: 609697D0
                                                                                                        • sqlite3_realloc.SQLITE3(?), ref: 609698A9
                                                                                                          • Part of subcall function 609129D5: sqlite3_initialize.SQLITE3(?,?,?,60915F55,?,?,?,?,?,?,00000000,?,?,?,60915FE2,00000000), ref: 609129E0
                                                                                                        • sqlite3_bind_int64.SQLITE3(?,?), ref: 609699B8
                                                                                                        • sqlite3_bind_int64.SQLITE3(?), ref: 6096934D
                                                                                                          • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                                        • sqlite3_bind_int64.SQLITE3(?,?), ref: 60969A6A
                                                                                                        • sqlite3_step.SQLITE3(?,?), ref: 60969A75
                                                                                                        • sqlite3_reset.SQLITE3(?,?), ref: 60969A80
                                                                                                        • sqlite3_free.SQLITE3(?), ref: 60969D41
                                                                                                        • sqlite3_free.SQLITE3(?), ref: 60969D4C
                                                                                                        • sqlite3_free.SQLITE3(?), ref: 60969D5B
                                                                                                          • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                                                                          • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                                                                          • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_bind_int64$sqlite3_freesqlite3_resetsqlite3_step$sqlite3_column_int64sqlite3_mallocsqlite3_realloc$sqlite3_column_intsqlite3_initializesqlite3_mprintfsqlite3_mutex_leavesqlite3_prepare_v2
                                                                                                        • String ID:
                                                                                                        • API String ID: 961572588-0
                                                                                                        • Opcode ID: c724daf3936d67fd3e7a59374d144345718a9f8d9c21f3c7abba70c9fa35c0f4
                                                                                                        • Instruction ID: dba6eef834311e7f80380fc62c490a647dd1765b4da9a7e0a506f520bf28697a
                                                                                                        • Opcode Fuzzy Hash: c724daf3936d67fd3e7a59374d144345718a9f8d9c21f3c7abba70c9fa35c0f4
                                                                                                        • Instruction Fuzzy Hash: 9872F275A042298FDB24CF69C88078DB7F6FF98314F1586A9D889AB341D774AD81CF81
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_bind_int64sqlite3_mutex_leavesqlite3_stricmp
                                                                                                        • String ID: 2$foreign key$indexed
                                                                                                        • API String ID: 4126863092-702264400
                                                                                                        • Opcode ID: efb0247afb620838301bdf32ec29a55ffab8ab84c5461d6934eb6e15b590f11f
                                                                                                        • Instruction ID: 3d5d194cd292e354de8359ea213fef7e5121ae3f60f7d2d7ba557b44893e8b9c
                                                                                                        • Opcode Fuzzy Hash: efb0247afb620838301bdf32ec29a55ffab8ab84c5461d6934eb6e15b590f11f
                                                                                                        • Instruction Fuzzy Hash: 6BE1B374A142099FDB04CFA8D590A9DBBF2BFA9304F21C129E855AB754DB35ED82CF40
                                                                                                        APIs
                                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6094A72B
                                                                                                        • sqlite3_step.SQLITE3 ref: 6094A73C
                                                                                                        • sqlite3_column_blob.SQLITE3 ref: 6094A760
                                                                                                        • sqlite3_column_bytes.SQLITE3 ref: 6094A77C
                                                                                                        • sqlite3_malloc.SQLITE3 ref: 6094A793
                                                                                                        • sqlite3_reset.SQLITE3 ref: 6094A7F2
                                                                                                        • sqlite3_free.SQLITE3(?), ref: 6094A87C
                                                                                                          • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_bind_int64sqlite3_column_blobsqlite3_column_bytessqlite3_freesqlite3_mallocsqlite3_mutex_entersqlite3_resetsqlite3_step
                                                                                                        • String ID:
                                                                                                        • API String ID: 2794791986-0
                                                                                                        • Opcode ID: 324244e72ed1eb068e97444324dd06558e7f5640642cd65f7376e38a8826fd77
                                                                                                        • Instruction ID: 088d5e00ded46b3eb5457b54e5d33bc48436a4b712d77f6ae5dc1ca3eb859b7b
                                                                                                        • Opcode Fuzzy Hash: 324244e72ed1eb068e97444324dd06558e7f5640642cd65f7376e38a8826fd77
                                                                                                        • Instruction Fuzzy Hash: BE5110B5A042058FCB04CF69C48069ABBF6FF68318F158569E858AB345D734EC82CF90
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_stricmp
                                                                                                        • String ID: USING COVERING INDEX $DISTINCT$ORDER BY
                                                                                                        • API String ID: 912767213-1308749736
                                                                                                        • Opcode ID: 5e6ae8a77223c4cf3853263767bd84c2ef0a0cb2633a4755bdfaa367f33b2fd5
                                                                                                        • Instruction ID: 4f43644a9add5c5df618cbd47cd61ce2203d262f2077f605e752fe25420d36ab
                                                                                                        • Opcode Fuzzy Hash: 5e6ae8a77223c4cf3853263767bd84c2ef0a0cb2633a4755bdfaa367f33b2fd5
                                                                                                        • Instruction Fuzzy Hash: 2412D674A08268CFDB25DF28C880B5AB7B3AFA9314F1085E9E8899B355D774DD81CF41
                                                                                                        APIs
                                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6094B488
                                                                                                        • sqlite3_step.SQLITE3 ref: 6094B496
                                                                                                        • sqlite3_reset.SQLITE3 ref: 6094B4A4
                                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6094B4D2
                                                                                                        • sqlite3_step.SQLITE3 ref: 6094B4E0
                                                                                                        • sqlite3_reset.SQLITE3 ref: 6094B4EE
                                                                                                          • Part of subcall function 6094B54C: memmove.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,6094B44B), ref: 6094B6B5
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_bind_int64sqlite3_resetsqlite3_step$memmove
                                                                                                        • String ID:
                                                                                                        • API String ID: 4082478743-0
                                                                                                        • Opcode ID: aa77e302053f557c70a8d8c80c1bb3ccc0b69d7e46be98bddd9db9cb48891f7f
                                                                                                        • Instruction ID: 9e7f29540a3c6f2d28ce6b101cd1a975f5529a8f599b89b7128c34d749e8d9ce
                                                                                                        • Opcode Fuzzy Hash: aa77e302053f557c70a8d8c80c1bb3ccc0b69d7e46be98bddd9db9cb48891f7f
                                                                                                        • Instruction Fuzzy Hash: DD41D2B4A087018FCB50DF69C484A9EB7F6EFA8364F158929EC99CB315E734E8418F51
                                                                                                        APIs
                                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 6094D354
                                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6094D546
                                                                                                          • Part of subcall function 60905D76: sqlite3_stricmp.SQLITE3 ref: 60905D8B
                                                                                                          • Part of subcall function 60905D76: sqlite3_stricmp.SQLITE3 ref: 60905DA4
                                                                                                          • Part of subcall function 60905D76: sqlite3_stricmp.SQLITE3 ref: 60905DB8
                                                                                                        • sqlite3_stricmp.SQLITE3 ref: 6094D3DA
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_stricmp$sqlite3_mutex_entersqlite3_mutex_leave
                                                                                                        • String ID: BINARY$INTEGER
                                                                                                        • API String ID: 317512412-1676293250
                                                                                                        • Opcode ID: a7efc97792d1e6a4bc5cda92ab6d03f9066f32250883ff14ac0274f07e3e06bf
                                                                                                        • Instruction ID: cace79839434994537c0410bddb438ad3d501bddbf1b20fcc6a8a8bdb5da7fdd
                                                                                                        • Opcode Fuzzy Hash: a7efc97792d1e6a4bc5cda92ab6d03f9066f32250883ff14ac0274f07e3e06bf
                                                                                                        • Instruction Fuzzy Hash: 8E712978A056099BDB05CF69C49079EBBF2BFA8308F11C529EC55AB3A4D734E941CF80
                                                                                                        APIs
                                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6094B582
                                                                                                        • sqlite3_step.SQLITE3 ref: 6094B590
                                                                                                        • sqlite3_column_int64.SQLITE3 ref: 6094B5AD
                                                                                                        • sqlite3_reset.SQLITE3 ref: 6094B5EE
                                                                                                        • memmove.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,6094B44B), ref: 6094B6B5
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: memmovesqlite3_bind_int64sqlite3_column_int64sqlite3_resetsqlite3_step
                                                                                                        • String ID:
                                                                                                        • API String ID: 2802900177-0
                                                                                                        • Opcode ID: f7dd783d858009ac2aa36dfb06bc3a4e86bc75c1920f7d1bf53ec4d0fe99899e
                                                                                                        • Instruction ID: fa681a173a9aa7ad5377a8f3376375fc0286f70c891b696e42c92f52458a3a0e
                                                                                                        • Opcode Fuzzy Hash: f7dd783d858009ac2aa36dfb06bc3a4e86bc75c1920f7d1bf53ec4d0fe99899e
                                                                                                        • Instruction Fuzzy Hash: 0B517D75A082018FCB14CF69C48169EF7F7FBA8314F25C669D8499B318EA74EC81CB81
                                                                                                        APIs
                                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 6093F443
                                                                                                          • Part of subcall function 60904396: sqlite3_mutex_try.SQLITE3(?,?,?,60908235), ref: 609043B8
                                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 6093F45C
                                                                                                          • Part of subcall function 60939559: memcmp.MSVCRT ref: 60939694
                                                                                                          • Part of subcall function 60939559: memcmp.MSVCRT ref: 609396CA
                                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6093F8CD
                                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6093F8E3
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: memcmpsqlite3_mutex_entersqlite3_mutex_leave$sqlite3_mutex_try
                                                                                                        • String ID:
                                                                                                        • API String ID: 4038589952-0
                                                                                                        • Opcode ID: 29e5932b9866e1e5e2fcd92ac707fe98724786dada8c9b11deae4621e05e1fb7
                                                                                                        • Instruction ID: 916146ddc5613ce70bfe97dc7fabc38680eb49f4f4fdba01105907ea2da9c682
                                                                                                        • Opcode Fuzzy Hash: 29e5932b9866e1e5e2fcd92ac707fe98724786dada8c9b11deae4621e05e1fb7
                                                                                                        • Instruction Fuzzy Hash: 87F13674A046158FDB18CFA9C590A9EB7F7AFA8308F248429E846AB355D774EC42CF40
                                                                                                        APIs
                                                                                                          • Part of subcall function 6094A894: sqlite3_bind_int64.SQLITE3 ref: 6094A8C0
                                                                                                          • Part of subcall function 6094A894: sqlite3_step.SQLITE3 ref: 6094A8CE
                                                                                                          • Part of subcall function 6094A894: sqlite3_column_int64.SQLITE3 ref: 6094A8E9
                                                                                                          • Part of subcall function 6094A894: sqlite3_reset.SQLITE3 ref: 6094A90F
                                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6094C719
                                                                                                        • sqlite3_step.SQLITE3 ref: 6094C72A
                                                                                                        • sqlite3_reset.SQLITE3 ref: 6094C73B
                                                                                                          • Part of subcall function 6094B54C: memmove.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,6094B44B), ref: 6094B6B5
                                                                                                          • Part of subcall function 6094A9F5: sqlite3_free.SQLITE3 ref: 6094AA7A
                                                                                                        • sqlite3_free.SQLITE3 ref: 6094C881
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_bind_int64sqlite3_freesqlite3_resetsqlite3_step$memmovesqlite3_column_int64
                                                                                                        • String ID:
                                                                                                        • API String ID: 3487101843-0
                                                                                                        • Opcode ID: 5f7c6ccdcb237f7a487fb09799aacf08d073da1bf61c53431d7ccff799043987
                                                                                                        • Instruction ID: dadb85a3919e548a164012fc2e04d9b0ab11445217433cc10b515e99a95ed5c3
                                                                                                        • Opcode Fuzzy Hash: 5f7c6ccdcb237f7a487fb09799aacf08d073da1bf61c53431d7ccff799043987
                                                                                                        • Instruction Fuzzy Hash: 3681FA74A046098FCB44DF99C480A9DF7F7AFA8354F258529E855AB314EB34EC46CF90
                                                                                                        APIs
                                                                                                          • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                                                                          • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                                                                          • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                                                                        • sqlite3_bind_int.SQLITE3 ref: 6096A3DE
                                                                                                          • Part of subcall function 609256E5: sqlite3_bind_int64.SQLITE3 ref: 60925704
                                                                                                        • sqlite3_column_int.SQLITE3 ref: 6096A3F3
                                                                                                        • sqlite3_step.SQLITE3 ref: 6096A435
                                                                                                        • sqlite3_reset.SQLITE3 ref: 6096A445
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_bind_intsqlite3_bind_int64sqlite3_column_intsqlite3_freesqlite3_mprintfsqlite3_prepare_v2sqlite3_resetsqlite3_step
                                                                                                        • String ID:
                                                                                                        • API String ID: 247099642-0
                                                                                                        • Opcode ID: 64427881e425bd4a7d2fa305579facb0dd1ab8a71ce9f1271cd8f49c57a97bec
                                                                                                        • Instruction ID: 69535c0605dcb565d56369453fd68d3a3097adfd173720c6e67b3d4aca8354ad
                                                                                                        • Opcode Fuzzy Hash: 64427881e425bd4a7d2fa305579facb0dd1ab8a71ce9f1271cd8f49c57a97bec
                                                                                                        • Instruction Fuzzy Hash: FF2151B0A143148BEB109FA9D88479EB7FAEF64308F00852DE89597350EBB8D845CF51
                                                                                                        APIs
                                                                                                          • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                                                                          • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                                                                          • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6096A322
                                                                                                          • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                                        • sqlite3_step.SQLITE3 ref: 6096A32D
                                                                                                        • sqlite3_column_int.SQLITE3 ref: 6096A347
                                                                                                          • Part of subcall function 6091D4F4: sqlite3_value_int.SQLITE3 ref: 6091D50C
                                                                                                        • sqlite3_reset.SQLITE3 ref: 6096A354
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_bind_int64sqlite3_column_intsqlite3_freesqlite3_mprintfsqlite3_mutex_leavesqlite3_prepare_v2sqlite3_resetsqlite3_stepsqlite3_value_int
                                                                                                        • String ID:
                                                                                                        • API String ID: 326482775-0
                                                                                                        • Opcode ID: de94f0bba3b8b54078f1ceecce583a965f8e010bb36370f6070bcd8bc28ee8b0
                                                                                                        • Instruction ID: 7c1586c82cd56d85cf32929a5cd575737867df940847ca2bf63216634e784e33
                                                                                                        • Opcode Fuzzy Hash: de94f0bba3b8b54078f1ceecce583a965f8e010bb36370f6070bcd8bc28ee8b0
                                                                                                        • Instruction Fuzzy Hash: 0E214DB0A043049BDB04DFA9C480B9EF7FAEFA8354F04C429E8959B340E778D8418B51
                                                                                                        APIs
                                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6094B71E
                                                                                                          • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6094B73C
                                                                                                        • sqlite3_step.SQLITE3 ref: 6094B74A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_bind_int64$sqlite3_mutex_leavesqlite3_step
                                                                                                        • String ID:
                                                                                                        • API String ID: 3305529457-0
                                                                                                        • Opcode ID: dc92f9052f14c19b23696c87723feab2593fd922d888b89f432a916288e70c30
                                                                                                        • Instruction ID: cea3564161c85327b61b62d60446574847d05a2bcfebeda4641ea5396b37aa5a
                                                                                                        • Opcode Fuzzy Hash: dc92f9052f14c19b23696c87723feab2593fd922d888b89f432a916288e70c30
                                                                                                        • Instruction Fuzzy Hash: D401A8B45047049FCB00DF19D9C968ABBE5FF98354F158869FC888B305D374E8548BA6
                                                                                                        APIs
                                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 6090C1EA
                                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6090C22F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_mutex_entersqlite3_mutex_leave
                                                                                                        • String ID:
                                                                                                        • API String ID: 1477753154-0
                                                                                                        • Opcode ID: 8c595cf50166d2d57a1b46d7a61a8743a20f226779b5cb212a2500e19f50b056
                                                                                                        • Instruction ID: fc120f7ed3300d8301d0f99cb769197b575d5683181bd6b289e4b53452841bc5
                                                                                                        • Opcode Fuzzy Hash: 8c595cf50166d2d57a1b46d7a61a8743a20f226779b5cb212a2500e19f50b056
                                                                                                        • Instruction Fuzzy Hash: 6501F4715042548BDB449F2EC4C576EBBEAEF65318F048469DD419B326D374D882CBA1
                                                                                                        APIs
                                                                                                          • Part of subcall function 6092535E: sqlite3_log.SQLITE3 ref: 60925406
                                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 609255B2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_logsqlite3_mutex_leave
                                                                                                        • String ID:
                                                                                                        • API String ID: 1465156292-0
                                                                                                        • Opcode ID: 61f2b65abbb078f396bfa931b2809e4962fa985140118a0fa907d432528e7d54
                                                                                                        • Instruction ID: 19c4c58ecb434a21204d9b38047e93a23a7f28015e8477a734fda6841bb58fe8
                                                                                                        • Opcode Fuzzy Hash: 61f2b65abbb078f396bfa931b2809e4962fa985140118a0fa907d432528e7d54
                                                                                                        • Instruction Fuzzy Hash: 56317AB4A082188FCB04DF69D880A8EBBF6FF99314F008559FC5897348D734D940CBA5
                                                                                                        APIs
                                                                                                          • Part of subcall function 6092535E: sqlite3_log.SQLITE3 ref: 60925406
                                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 60925508
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_logsqlite3_mutex_leave
                                                                                                        • String ID:
                                                                                                        • API String ID: 1465156292-0
                                                                                                        • Opcode ID: 7f15987c0945e0fd4273a36fcce91cc0d916abb620506d2e7fdad6d0c82ef640
                                                                                                        • Instruction ID: ad89f0bb34aa7175efe61e1ac22fb0c12735e6005c3b9edbf096fd229bca234b
                                                                                                        • Opcode Fuzzy Hash: 7f15987c0945e0fd4273a36fcce91cc0d916abb620506d2e7fdad6d0c82ef640
                                                                                                        • Instruction Fuzzy Hash: 5A01A475B107148BCB109F2ACC8164BBBFAEF68254F05991AEC41DB315D775ED458BC0
                                                                                                        APIs
                                                                                                          • Part of subcall function 6092535E: sqlite3_log.SQLITE3 ref: 60925406
                                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_logsqlite3_mutex_leave
                                                                                                        • String ID:
                                                                                                        • API String ID: 1465156292-0
                                                                                                        • Opcode ID: ebbe32869a67294cb2d54c108597a832b3743d43329dcf341f64f2493053d601
                                                                                                        • Instruction ID: 4fd0dfe8dd6226820e052206e0db6187a6d8a97f2116fb4a305c2fd2856f8961
                                                                                                        • Opcode Fuzzy Hash: ebbe32869a67294cb2d54c108597a832b3743d43329dcf341f64f2493053d601
                                                                                                        • Instruction Fuzzy Hash: 94F08CB5A002099BCB00DF2AD88088ABBBAFF98264B05952AEC049B314D770E941CBD0
                                                                                                        APIs
                                                                                                          • Part of subcall function 6092535E: sqlite3_log.SQLITE3 ref: 60925406
                                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 60925678
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_logsqlite3_mutex_leave
                                                                                                        • String ID:
                                                                                                        • API String ID: 1465156292-0
                                                                                                        • Opcode ID: 20ce1548f611e36a3668a48b9975394e1a388ab84833d9cb320a678b216caf11
                                                                                                        • Instruction ID: bc2fa39936d9f4ed0ba1ebf98b65e017ff83ed2bbf5e058a49948814e7f33c49
                                                                                                        • Opcode Fuzzy Hash: 20ce1548f611e36a3668a48b9975394e1a388ab84833d9cb320a678b216caf11
                                                                                                        • Instruction Fuzzy Hash: 59E0EC74A042089BCB04DF6AD4C194AB7F9EF58258B14D665EC458B309E231E9858BC1
                                                                                                        APIs
                                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 60925704
                                                                                                          • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_bind_int64sqlite3_mutex_leave
                                                                                                        • String ID:
                                                                                                        • API String ID: 3064317574-0
                                                                                                        • Opcode ID: 8bfbb127be37b3944cf6aee767a60d103abce584902525ba566a621f413e0d82
                                                                                                        • Instruction ID: 7a9bf9350bb0d435b7485bd9c083abc2dab3a9c90cc7cce47300d03dda88f0d0
                                                                                                        • Opcode Fuzzy Hash: 8bfbb127be37b3944cf6aee767a60d103abce584902525ba566a621f413e0d82
                                                                                                        • Instruction Fuzzy Hash: FFD092B4909309AFCB00EF29C48644EBBE5AF98258F40C82DFC98C7314E274E8408F92
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 5c5aa561fe8b7943dde2a358ba30c2c8876ef78bddd50c77f68009583e67d90a
                                                                                                        • Instruction ID: 29002ccca7877ead4b7e7e784383ace88c03f26ddf616943a2b43c0eb71ea2e3
                                                                                                        • Opcode Fuzzy Hash: 5c5aa561fe8b7943dde2a358ba30c2c8876ef78bddd50c77f68009583e67d90a
                                                                                                        • Instruction Fuzzy Hash: 36E0E2B850430DABDF00CF09D8C188A7BAAFB08364F10C119FC190B305C371E9548BA1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: c82c79c3d673ce5d83164ffe7b594e49b00bd73c00824d0aa5044480003c1f0d
                                                                                                        • Instruction ID: a276b763828cd9d21177d39229c24ef0f5c00ef14d0f26540801fec71d9d5410
                                                                                                        • Opcode Fuzzy Hash: c82c79c3d673ce5d83164ffe7b594e49b00bd73c00824d0aa5044480003c1f0d
                                                                                                        • Instruction Fuzzy Hash: 29E0E2B850430DABDF00CF09D8C198A7BAAFB08264F10C119FC190B304C331E9148BE1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: d3c407e99ff1326d716251d27052f3514f6d3ace0f30ccd24b81610f61b1d9b8
                                                                                                        • Instruction ID: aa639d4c52eda77921d109c173628d401b16d57fa3137d2b917a91732d8775c8
                                                                                                        • Opcode Fuzzy Hash: d3c407e99ff1326d716251d27052f3514f6d3ace0f30ccd24b81610f61b1d9b8
                                                                                                        • Instruction Fuzzy Hash: D7C01265704208574B00E92DE8C154577AA9718164B108039E80B87301D975ED084291
                                                                                                        APIs
                                                                                                        • sqlite3_initialize.SQLITE3 ref: 6096C5BE
                                                                                                          • Part of subcall function 60912453: sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 609124D1
                                                                                                        • sqlite3_log.SQLITE3 ref: 6096C5FC
                                                                                                        • sqlite3_free.SQLITE3 ref: 6096C67E
                                                                                                        • sqlite3_free.SQLITE3 ref: 6096CD71
                                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6096CD80
                                                                                                        • sqlite3_errcode.SQLITE3 ref: 6096CD88
                                                                                                        • sqlite3_close.SQLITE3 ref: 6096CD97
                                                                                                        • sqlite3_create_function.SQLITE3 ref: 6096CDF8
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_free$sqlite3_closesqlite3_create_functionsqlite3_errcodesqlite3_initializesqlite3_logsqlite3_mutex_entersqlite3_mutex_leave
                                                                                                        • String ID: BINARY$NOCASE$RTRIM$porter$rtree$rtree_i32$simple
                                                                                                        • API String ID: 1320758876-2501389569
                                                                                                        • Opcode ID: 6bfcb0ec024900a9d9b4e92c8a495cd7f0e11888819caa106d9e2d842adf35f2
                                                                                                        • Instruction ID: 66f98c4e8467cc0752991b2fada45a5d6d89a43a55ba94f1559c09c68fc79e30
                                                                                                        • Opcode Fuzzy Hash: 6bfcb0ec024900a9d9b4e92c8a495cd7f0e11888819caa106d9e2d842adf35f2
                                                                                                        • Instruction Fuzzy Hash: 7A024BB05183019BEB119F64C49536ABFF6BFA1348F11882DE8959F386D7B9C845CF82
                                                                                                        APIs
                                                                                                        • sqlite3_free.SQLITE3 ref: 609264C9
                                                                                                        • sqlite3_free.SQLITE3 ref: 60926526
                                                                                                        • sqlite3_free.SQLITE3 ref: 6092652E
                                                                                                        • sqlite3_free.SQLITE3 ref: 60926550
                                                                                                          • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                                          • Part of subcall function 6090AFF5: sqlite3_free.SQLITE3 ref: 6090B09A
                                                                                                        • sqlite3_free.SQLITE3 ref: 60926626
                                                                                                        • sqlite3_win32_mbcs_to_utf8.SQLITE3 ref: 6092662E
                                                                                                        • sqlite3_free.SQLITE3 ref: 60926638
                                                                                                        • sqlite3_snprintf.SQLITE3 ref: 6092666B
                                                                                                        • sqlite3_free.SQLITE3 ref: 60926673
                                                                                                        • sqlite3_snprintf.SQLITE3 ref: 609266B8
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_free$sqlite3_snprintf$sqlite3_mutex_entersqlite3_win32_mbcs_to_utf8
                                                                                                        • String ID: \$winFullPathname1$winFullPathname2$winFullPathname3$winFullPathname4
                                                                                                        • API String ID: 937752868-2111127023
                                                                                                        • Opcode ID: 76700054f020c8d7fe753577c30eef17e659d67ca67044e42639e839992701d7
                                                                                                        • Instruction ID: 28f04709130b2e8b140c84fcd32bad5e17fba194e1ccee1aab8ced89c5ccf9cf
                                                                                                        • Opcode Fuzzy Hash: 76700054f020c8d7fe753577c30eef17e659d67ca67044e42639e839992701d7
                                                                                                        • Instruction Fuzzy Hash: EA712E706183058FE700AF69D88465DBFF6AFA5748F00C82DE8999B314E778C845DF92
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: memcmp$sqlite3_mprintf$sqlite3_malloc$sqlite3_freesqlite3_vfs_find
                                                                                                        • String ID: @$access$cache
                                                                                                        • API String ID: 4158134138-1361544076
                                                                                                        • Opcode ID: 19065094f7a61ae5fa0f118773a69bd69932ab9bc71fb499c0e2e31449818374
                                                                                                        • Instruction ID: 35071b2ec389daa84eb338d99e29a1052eb2425681bc363379ff67fe3f9a0dd7
                                                                                                        • Opcode Fuzzy Hash: 19065094f7a61ae5fa0f118773a69bd69932ab9bc71fb499c0e2e31449818374
                                                                                                        • Instruction Fuzzy Hash: 27D19E75D183458BDB11CF69E58039EBBF7AFAA304F20846ED4949B349D339D882CB52
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        • PRAGMA vacuum_db.synchronous=OFF, xrefs: 609485BB
                                                                                                        • SELECT 'CREATE TABLE vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE type='table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0, xrefs: 609486C8
                                                                                                        • SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence' , xrefs: 60948748
                                                                                                        • SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';, xrefs: 60948768
                                                                                                        • SELECT 'CREATE UNIQUE INDEX vacuum_db.' || substr(sql,21) FROM sqlite_master WHERE sql LIKE 'CREATE UNIQUE INDEX %', xrefs: 60948708
                                                                                                        • BEGIN;, xrefs: 609485DB
                                                                                                        • ATTACH ':memory:' AS vacuum_db;, xrefs: 60948534
                                                                                                        • INSERT INTO vacuum_db.sqlite_master SELECT type, name, tbl_name, rootpage, sql FROM main.sqlite_master WHERE type='view' OR type='trigger' OR (type='table' AND rootpage=0), xrefs: 60948788
                                                                                                        • ATTACH '' AS vacuum_db;, xrefs: 60948529
                                                                                                        • SELECT 'CREATE INDEX vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE sql LIKE 'CREATE INDEX %' , xrefs: 609486E8
                                                                                                        • SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0, xrefs: 60948728
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_log
                                                                                                        • String ID: ATTACH '' AS vacuum_db;$ATTACH ':memory:' AS vacuum_db;$BEGIN;$INSERT INTO vacuum_db.sqlite_master SELECT type, name, tbl_name, rootpage, sql FROM main.sqlite_master WHERE type='view' OR type='trigger' OR (type='table' AND rootpage=0)$PRAGMA vacuum_db.synchronous=OFF$SELECT 'CREATE INDEX vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE sql LIKE 'CREATE INDEX %' $SELECT 'CREATE TABLE vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE type='table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0$SELECT 'CREATE UNIQUE INDEX vacuum_db.' || substr(sql,21) FROM sqlite_master WHERE sql LIKE 'CREATE UNIQUE INDEX %'$SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence' $SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';$SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
                                                                                                        • API String ID: 632333372-52344843
                                                                                                        • Opcode ID: d52540ff3cd5a889f8fcb2175177c5c293f6bf3e96b3409faf11301466b535e5
                                                                                                        • Instruction ID: 17dae18cb22bd420f764556e48f7e631e7f528851c991f2db59136dec61311d4
                                                                                                        • Opcode Fuzzy Hash: d52540ff3cd5a889f8fcb2175177c5c293f6bf3e96b3409faf11301466b535e5
                                                                                                        • Instruction Fuzzy Hash: 1202F6B0A046299BDB2ACF18C88179EB7FABF65304F1081D9E858AB355D771DE81CF41
                                                                                                        APIs
                                                                                                          • Part of subcall function 609296D1: sqlite3_value_bytes.SQLITE3 ref: 609296F3
                                                                                                          • Part of subcall function 609296D1: sqlite3_mprintf.SQLITE3 ref: 60929708
                                                                                                          • Part of subcall function 609296D1: sqlite3_free.SQLITE3 ref: 6092971B
                                                                                                          • Part of subcall function 6095FFB2: sqlite3_bind_int64.SQLITE3 ref: 6095FFFA
                                                                                                          • Part of subcall function 6095FFB2: sqlite3_step.SQLITE3 ref: 60960009
                                                                                                          • Part of subcall function 6095FFB2: sqlite3_reset.SQLITE3 ref: 60960019
                                                                                                          • Part of subcall function 6095FFB2: sqlite3_result_error_code.SQLITE3 ref: 60960043
                                                                                                        • sqlite3_malloc.SQLITE3 ref: 60960384
                                                                                                        • sqlite3_free.SQLITE3 ref: 609605EA
                                                                                                        • sqlite3_result_error_code.SQLITE3 ref: 6096060D
                                                                                                        • sqlite3_free.SQLITE3 ref: 60960618
                                                                                                        • sqlite3_result_text.SQLITE3 ref: 6096063C
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_free$sqlite3_result_error_code$sqlite3_bind_int64sqlite3_mallocsqlite3_mprintfsqlite3_resetsqlite3_result_textsqlite3_stepsqlite3_value_bytes
                                                                                                        • String ID: offsets
                                                                                                        • API String ID: 463808202-2642679573
                                                                                                        • Opcode ID: 496dcd0dbd0e24e84f3ae9a4f9495b5d667a7098f4014ef95464c797b1727b83
                                                                                                        • Instruction ID: 1101d6838161b799219a4b3d5732631e197d31251dd2d8b91c34f261bd2faa79
                                                                                                        • Opcode Fuzzy Hash: 496dcd0dbd0e24e84f3ae9a4f9495b5d667a7098f4014ef95464c797b1727b83
                                                                                                        • Instruction Fuzzy Hash: 72C1D374A183198FDB14CF59C580B8EBBF2BFA8314F2085A9E849AB354D734D985CF52
                                                                                                        APIs
                                                                                                        • sqlite3_value_text.SQLITE3 ref: 6091A3C1
                                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 6091A3D6
                                                                                                        • sqlite3_value_text.SQLITE3 ref: 6091A3E4
                                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 6091A416
                                                                                                        • sqlite3_value_text.SQLITE3 ref: 6091A424
                                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 6091A43A
                                                                                                        • sqlite3_result_text.SQLITE3 ref: 6091A5A2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_value_bytessqlite3_value_text$sqlite3_result_text
                                                                                                        • String ID:
                                                                                                        • API String ID: 2903785150-0
                                                                                                        • Opcode ID: 408a6008a3f19a662094ad197d730d6af4ceeedc2d56196c0f88669f9a2ea12f
                                                                                                        • Instruction ID: 050d84d3da0bd462ad4a4a15df4a38950001fc66f1de33c81d7c2c3a6f7146e7
                                                                                                        • Opcode Fuzzy Hash: 408a6008a3f19a662094ad197d730d6af4ceeedc2d56196c0f88669f9a2ea12f
                                                                                                        • Instruction Fuzzy Hash: 8971D074E086599FCF00DFA8C88069DBBF2BF59314F1485AAE855AB304E734EC85CB91
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_freesqlite3_malloc
                                                                                                        • String ID:
                                                                                                        • API String ID: 423083942-0
                                                                                                        • Opcode ID: 039a1925b88827ab71129b12bf0a0cfd7bb9a75e2f5fb5313a60c0869b9e4a18
                                                                                                        • Instruction ID: dba10035f3c017a022ff92dc0406edc4c972eb6647695f7afdbed5011b3e14eb
                                                                                                        • Opcode Fuzzy Hash: 039a1925b88827ab71129b12bf0a0cfd7bb9a75e2f5fb5313a60c0869b9e4a18
                                                                                                        • Instruction Fuzzy Hash: 9112E3B4A15218CFCB18CF98D480A9EBBF6BF98304F24855AD855AB319D774EC42CF90
                                                                                                        APIs
                                                                                                        • sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 609124D1
                                                                                                        • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 6091264D
                                                                                                        • sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 60912662
                                                                                                        • sqlite3_malloc.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 6091273E
                                                                                                        • sqlite3_free.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 60912753
                                                                                                        • sqlite3_os_init.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 60912758
                                                                                                        • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 60912803
                                                                                                        • sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 6091280E
                                                                                                        • sqlite3_mutex_free.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 6091282A
                                                                                                        • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 6091283F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_mutex_entersqlite3_mutex_leave$sqlite3_freesqlite3_mallocsqlite3_mutex_freesqlite3_os_init
                                                                                                        • String ID:
                                                                                                        • API String ID: 3556715608-0
                                                                                                        • Opcode ID: 7a5b012c4fe40a1866ea25e0c9ef8651b072e840c3be51a8f23ca71a75eb633f
                                                                                                        • Instruction ID: 37d7613b282c24208f37f95ee69ae3eaf9c0527d79975c213f2f38643f7f707f
                                                                                                        • Opcode Fuzzy Hash: 7a5b012c4fe40a1866ea25e0c9ef8651b072e840c3be51a8f23ca71a75eb633f
                                                                                                        • Instruction Fuzzy Hash: FEA14A71A2C215CBEB009F69CC843257FE7B7A7318F10816DD415AB2A0E7B9DC95EB11
                                                                                                        APIs
                                                                                                        • sqlite3_malloc.SQLITE3 ref: 6095F645
                                                                                                        • sqlite3_exec.SQLITE3 ref: 6095F686
                                                                                                          • Part of subcall function 6094CBB8: sqlite3_log.SQLITE3 ref: 6094CBF8
                                                                                                        • sqlite3_free_table.SQLITE3 ref: 6095F6A0
                                                                                                        • sqlite3_mprintf.SQLITE3 ref: 6095F6C7
                                                                                                          • Part of subcall function 609296AA: sqlite3_initialize.SQLITE3 ref: 609296B0
                                                                                                          • Part of subcall function 609296AA: sqlite3_vmprintf.SQLITE3 ref: 609296CA
                                                                                                        • sqlite3_free.SQLITE3 ref: 6095F6B4
                                                                                                          • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                                        • sqlite3_free.SQLITE3 ref: 6095F6D4
                                                                                                        • sqlite3_free.SQLITE3 ref: 6095F6ED
                                                                                                        • sqlite3_free_table.SQLITE3 ref: 6095F6FF
                                                                                                        • sqlite3_realloc.SQLITE3 ref: 6095F71B
                                                                                                        • sqlite3_free_table.SQLITE3 ref: 6095F72D
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_freesqlite3_free_table$sqlite3_execsqlite3_initializesqlite3_logsqlite3_mallocsqlite3_mprintfsqlite3_mutex_entersqlite3_reallocsqlite3_vmprintf
                                                                                                        • String ID:
                                                                                                        • API String ID: 1866449048-0
                                                                                                        • Opcode ID: 2addae8d4502475aa330d0fbe12d9077f3fed0f055932ab6dac269a256a03500
                                                                                                        • Instruction ID: 9ac78cbffd0e0cf27e5d0fdbf17c3a3d034f00011a14f89e76d08e502163788c
                                                                                                        • Opcode Fuzzy Hash: 2addae8d4502475aa330d0fbe12d9077f3fed0f055932ab6dac269a256a03500
                                                                                                        • Instruction Fuzzy Hash: 8751F1B49467099FDB01DF69D59178EBBF6FF68318F104429E884AB300D379D894CB91
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: $ AND $%s USING %sINDEX %s%s$%s USING AUTOMATIC %sINDEX%.0s%s$)><$0$ANY($COVERING $SCAN$SEARCH$rowid
                                                                                                        • API String ID: 0-780898
                                                                                                        • Opcode ID: d1d17e5dd7c74eae3224551f6f3ab351f201226dcaab78a09df61ec6b72ac00d
                                                                                                        • Instruction ID: 1b008e11d07f16b9462ef115b46fd1892196ed4c5360d6a6f9a636b6bab85f9b
                                                                                                        • Opcode Fuzzy Hash: d1d17e5dd7c74eae3224551f6f3ab351f201226dcaab78a09df61ec6b72ac00d
                                                                                                        • Instruction Fuzzy Hash: 46D109B0A087099FD714CF99C19079DBBF2BFA8308F10886AE495AB355D774D982CF81
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: aolf$aolf$bolb$bolc$buod$buod$laer$laer$rahc$tni$txet
                                                                                                        • API String ID: 0-2604012851
                                                                                                        • Opcode ID: b472df4709d2161ac4da3e6dd873a69b8789eadb7617e1432b7f17fad04b9ea6
                                                                                                        • Instruction ID: a78f5df49eecf700eafad7d6eadd6707640e608d2d263d021760269e78388884
                                                                                                        • Opcode Fuzzy Hash: b472df4709d2161ac4da3e6dd873a69b8789eadb7617e1432b7f17fad04b9ea6
                                                                                                        • Instruction Fuzzy Hash: 2D31B171A891458ADB21891C85503EE7FBB9BE3344F28902EC8B2DB246C735CCD0C3A2
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: memcmp$sqlite3_logsqlite3_mutex_try
                                                                                                        • String ID: 0$SQLite format 3
                                                                                                        • API String ID: 3174206576-3388949527
                                                                                                        • Opcode ID: e2a376b1a29b79c4f9f51ec04e7584e9c4e5062bfe0a82991cc629df80cc0a0f
                                                                                                        • Instruction ID: d3cc03899c2fb96d27ccc41cf7ad58ff30b38a29db2c3208110d6cb2c70dce50
                                                                                                        • Opcode Fuzzy Hash: e2a376b1a29b79c4f9f51ec04e7584e9c4e5062bfe0a82991cc629df80cc0a0f
                                                                                                        • Instruction Fuzzy Hash: A3028BB0A082659BDB09CF68D48178ABBF7FFA5308F148269E8459B345DB74DC85CF81
                                                                                                        APIs
                                                                                                        • sqlite3_value_text.SQLITE3 ref: 6095F030
                                                                                                        • sqlite3_value_text.SQLITE3 ref: 6095F03E
                                                                                                        • sqlite3_stricmp.SQLITE3 ref: 6095F0B3
                                                                                                        • sqlite3_free.SQLITE3 ref: 6095F180
                                                                                                          • Part of subcall function 6092E279: strcmp.MSVCRT ref: 6092E2AE
                                                                                                          • Part of subcall function 6092E279: sqlite3_free.SQLITE3 ref: 6092E3A8
                                                                                                        • sqlite3_free.SQLITE3 ref: 6095F1BD
                                                                                                          • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                                        • sqlite3_result_error_code.SQLITE3 ref: 6095F34E
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_free$sqlite3_value_text$sqlite3_mutex_entersqlite3_result_error_codesqlite3_stricmpstrcmp
                                                                                                        • String ID: |
                                                                                                        • API String ID: 1576672187-2343686810
                                                                                                        • Opcode ID: 45796efa6547682f16092b9fa288c01422e20de86ab54653b6df12e990b05c38
                                                                                                        • Instruction ID: c4017fd8acd983bc841f22cdb0f4132ffe50c361176833da1127552c957ad2bb
                                                                                                        • Opcode Fuzzy Hash: 45796efa6547682f16092b9fa288c01422e20de86ab54653b6df12e990b05c38
                                                                                                        • Instruction Fuzzy Hash: B2B189B4A08308CBDB01CF69C491B9EBBF2BF68358F148968E854AB355D734EC55CB81
                                                                                                        APIs
                                                                                                        • sqlite3_file_control.SQLITE3 ref: 609537BD
                                                                                                        • sqlite3_free.SQLITE3 ref: 60953842
                                                                                                        • sqlite3_free.SQLITE3 ref: 6095387C
                                                                                                          • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                                        • sqlite3_stricmp.SQLITE3 ref: 609538D4
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_free$sqlite3_file_controlsqlite3_mutex_entersqlite3_stricmp
                                                                                                        • String ID: 6$timeout
                                                                                                        • API String ID: 2671017102-3660802998
                                                                                                        • Opcode ID: 8cffcba2199636318c40f61931f0f453c1b4c4e8a0677f5b7de6569c291e0b77
                                                                                                        • Instruction ID: da3e9078838fdf1f068eeacc94130b5fe058058c2a53432068b0843c8cdd1fdd
                                                                                                        • Opcode Fuzzy Hash: 8cffcba2199636318c40f61931f0f453c1b4c4e8a0677f5b7de6569c291e0b77
                                                                                                        • Instruction Fuzzy Hash: 6CA11270A083198BDB15CF6AC88079EBBF6BFA9304F10846DE8589B354D774D885CF41
                                                                                                        APIs
                                                                                                        • sqlite3_snprintf.SQLITE3 ref: 6095D450
                                                                                                          • Part of subcall function 60917354: sqlite3_vsnprintf.SQLITE3 ref: 60917375
                                                                                                        • sqlite3_snprintf.SQLITE3 ref: 6095D4A1
                                                                                                        • sqlite3_snprintf.SQLITE3 ref: 6095D525
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_snprintf$sqlite3_vsnprintf
                                                                                                        • String ID: $)><$sqlite_master$sqlite_temp_master
                                                                                                        • API String ID: 652164897-1572359634
                                                                                                        • Opcode ID: 7664a015b2dc01db37cf12657f922778db359f6c70a1ba93bfebbfbe3581116b
                                                                                                        • Instruction ID: a98725bc65f6cff0ffebef66634980575a39ba2d787d432de3c608a01e11e389
                                                                                                        • Opcode Fuzzy Hash: 7664a015b2dc01db37cf12657f922778db359f6c70a1ba93bfebbfbe3581116b
                                                                                                        • Instruction Fuzzy Hash: 5991F275E05219CFCB15CF98C48169DBBF2BFA9308F14845AE859AB314DB34ED46CB81
                                                                                                        APIs
                                                                                                        • sqlite3_value_text.SQLITE3 ref: 6091B06E
                                                                                                        • sqlite3_result_error_toobig.SQLITE3 ref: 6091B178
                                                                                                        • sqlite3_result_error_nomem.SQLITE3 ref: 6091B197
                                                                                                        • sqlite3_result_text.SQLITE3 ref: 6091B5A3
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_result_error_nomemsqlite3_result_error_toobigsqlite3_result_textsqlite3_value_text
                                                                                                        • String ID:
                                                                                                        • API String ID: 2352520524-0
                                                                                                        • Opcode ID: bf61c68f4ce88464188c3b4ec21cbec410585f797eaf5b0aff599f1fc01aebfc
                                                                                                        • Instruction ID: 99f21b63ad5c9672efebb0dd762c853f70c7e366ddc85f9db9da2d733c13ec0c
                                                                                                        • Opcode Fuzzy Hash: bf61c68f4ce88464188c3b4ec21cbec410585f797eaf5b0aff599f1fc01aebfc
                                                                                                        • Instruction Fuzzy Hash: F9E16B71E4C2199BDB208F18C89039EBBF7AB65314F1584DAE8A857351D738DCC19F82
                                                                                                        APIs
                                                                                                          • Part of subcall function 609296D1: sqlite3_value_bytes.SQLITE3 ref: 609296F3
                                                                                                          • Part of subcall function 609296D1: sqlite3_mprintf.SQLITE3 ref: 60929708
                                                                                                          • Part of subcall function 609296D1: sqlite3_free.SQLITE3 ref: 6092971B
                                                                                                        • sqlite3_exec.SQLITE3 ref: 6096A4D7
                                                                                                          • Part of subcall function 6094CBB8: sqlite3_log.SQLITE3 ref: 6094CBF8
                                                                                                        • sqlite3_result_text.SQLITE3 ref: 6096A5D3
                                                                                                          • Part of subcall function 6096A38C: sqlite3_bind_int.SQLITE3 ref: 6096A3DE
                                                                                                          • Part of subcall function 6096A38C: sqlite3_step.SQLITE3 ref: 6096A435
                                                                                                          • Part of subcall function 6096A38C: sqlite3_reset.SQLITE3 ref: 6096A445
                                                                                                        • sqlite3_exec.SQLITE3 ref: 6096A523
                                                                                                        • sqlite3_exec.SQLITE3 ref: 6096A554
                                                                                                        • sqlite3_exec.SQLITE3 ref: 6096A57F
                                                                                                        • sqlite3_result_error_code.SQLITE3 ref: 6096A5E1
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_exec$sqlite3_bind_intsqlite3_freesqlite3_logsqlite3_mprintfsqlite3_resetsqlite3_result_error_codesqlite3_result_textsqlite3_stepsqlite3_value_bytes
                                                                                                        • String ID: optimize
                                                                                                        • API String ID: 3659050757-3797040228
                                                                                                        • Opcode ID: c770602c58b8b739d860714e2a7cbb539b0686760bc80d510edb2603001de118
                                                                                                        • Instruction ID: 653702cfcd2f061f0588c77de086fc27204f9fc351fc8b4992cba684a546c14d
                                                                                                        • Opcode Fuzzy Hash: c770602c58b8b739d860714e2a7cbb539b0686760bc80d510edb2603001de118
                                                                                                        • Instruction Fuzzy Hash: E831C3B11187119FE310DF24C49570FBBE6ABA1368F10C91DF9968B350E7B9D8459F82
                                                                                                        APIs
                                                                                                        • sqlite3_column_blob.SQLITE3 ref: 609654FB
                                                                                                        • sqlite3_column_bytes.SQLITE3 ref: 60965510
                                                                                                        • sqlite3_reset.SQLITE3 ref: 60965556
                                                                                                        • sqlite3_reset.SQLITE3 ref: 609655B8
                                                                                                          • Part of subcall function 60941C40: sqlite3_mutex_enter.SQLITE3 ref: 60941C58
                                                                                                          • Part of subcall function 60941C40: sqlite3_mutex_leave.SQLITE3 ref: 60941CBE
                                                                                                        • sqlite3_malloc.SQLITE3 ref: 60965655
                                                                                                        • sqlite3_free.SQLITE3 ref: 60965714
                                                                                                        • sqlite3_free.SQLITE3 ref: 6096574B
                                                                                                          • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                                        • sqlite3_free.SQLITE3 ref: 609657AA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_free$sqlite3_mutex_entersqlite3_reset$sqlite3_column_blobsqlite3_column_bytessqlite3_mallocsqlite3_mutex_leave
                                                                                                        • String ID:
                                                                                                        • API String ID: 2722129401-0
                                                                                                        • Opcode ID: 718344d9776843f9d3d0f11354c3fb96bdbf3732bae6ebd8df48c35682458f02
                                                                                                        • Instruction ID: e3a8cc565ee031670952cbbbf81914cbe75110044a29491daaf6513bdc913a85
                                                                                                        • Opcode Fuzzy Hash: 718344d9776843f9d3d0f11354c3fb96bdbf3732bae6ebd8df48c35682458f02
                                                                                                        • Instruction Fuzzy Hash: BBD1D270E14219CFEB14CFA9C48469DBBF2BF68304F20856AD899AB346D774E845CF81
                                                                                                        APIs
                                                                                                        • sqlite3_malloc.SQLITE3 ref: 609645D9
                                                                                                          • Part of subcall function 60928099: sqlite3_malloc.SQLITE3 ref: 609280ED
                                                                                                        • sqlite3_free.SQLITE3 ref: 609647C5
                                                                                                          • Part of subcall function 60963D35: memcmp.MSVCRT ref: 60963E74
                                                                                                        • sqlite3_free.SQLITE3 ref: 6096476B
                                                                                                          • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                                        • sqlite3_free.SQLITE3 ref: 6096477B
                                                                                                        • sqlite3_free.SQLITE3 ref: 60964783
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_free$sqlite3_malloc$memcmpsqlite3_mutex_enter
                                                                                                        • String ID:
                                                                                                        • API String ID: 571598680-0
                                                                                                        • Opcode ID: d604abe0313f10411a0f234c71df8e29ee85eaf68e2bcebad1bf05c151ae1b53
                                                                                                        • Instruction ID: 53ad94a03898eae12f4127695087571842428d6fdffc19c65fee49adcf86f1ae
                                                                                                        • Opcode Fuzzy Hash: d604abe0313f10411a0f234c71df8e29ee85eaf68e2bcebad1bf05c151ae1b53
                                                                                                        • Instruction Fuzzy Hash: 5E91F674E14228CFEB14CFA9D890B9EBBB6BB99304F1085AAD849A7344D734DD81CF51
                                                                                                        APIs
                                                                                                        • sqlite3_blob_reopen.SQLITE3 ref: 60963510
                                                                                                          • Part of subcall function 60962F28: sqlite3_log.SQLITE3 ref: 60962F5D
                                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60963534
                                                                                                        • sqlite3_blob_open.SQLITE3 ref: 6096358B
                                                                                                        • sqlite3_blob_bytes.SQLITE3 ref: 609635A3
                                                                                                        • sqlite3_malloc.SQLITE3 ref: 609635BB
                                                                                                        • sqlite3_blob_read.SQLITE3 ref: 60963602
                                                                                                        • sqlite3_free.SQLITE3 ref: 60963621
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_blob_bytessqlite3_blob_opensqlite3_blob_readsqlite3_blob_reopensqlite3_freesqlite3_logsqlite3_mallocsqlite3_mprintf
                                                                                                        • String ID:
                                                                                                        • API String ID: 4276469440-0
                                                                                                        • Opcode ID: 81f80890dbec9a3991ff68d8cfcbb164f6b4d7f09a97d6cb6c54cb11191f3d09
                                                                                                        • Instruction ID: 177081cd506585250240414a33056f89eeda992db91a315aff795e5fc91eaf1e
                                                                                                        • Opcode Fuzzy Hash: 81f80890dbec9a3991ff68d8cfcbb164f6b4d7f09a97d6cb6c54cb11191f3d09
                                                                                                        • Instruction Fuzzy Hash: C641E5B09087059FDB40DF29C48179EBBE6AF98354F01C87AE898DB354E734D841DB92
                                                                                                        APIs
                                                                                                        • sqlite3_value_text.SQLITE3 ref: 6091A240
                                                                                                        • sqlite3_value_text.SQLITE3 ref: 6091A24E
                                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 6091A25A
                                                                                                        • sqlite3_value_text.SQLITE3 ref: 6091A27C
                                                                                                        Strings
                                                                                                        • ESCAPE expression must be a single character, xrefs: 6091A293
                                                                                                        • LIKE or GLOB pattern too complex, xrefs: 6091A267
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_value_text$sqlite3_value_bytes
                                                                                                        • String ID: ESCAPE expression must be a single character$LIKE or GLOB pattern too complex
                                                                                                        • API String ID: 4080917175-264706735
                                                                                                        • Opcode ID: e5bda90e0e0ba1860c41bc069fb20e3a267b2c9271c0a370806f06164fd47fa4
                                                                                                        • Instruction ID: 7e7232241edcba55bc41816b79a09feadaac9d75cc2fb544db44a2248cbef301
                                                                                                        • Opcode Fuzzy Hash: e5bda90e0e0ba1860c41bc069fb20e3a267b2c9271c0a370806f06164fd47fa4
                                                                                                        • Instruction Fuzzy Hash: A4214C74A182198BCB00DF79C88165EBBF6FF64354B108AA9E864DB344E734DCC6CB95
                                                                                                        APIs
                                                                                                          • Part of subcall function 6092506E: sqlite3_log.SQLITE3 ref: 609250AB
                                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 609250E7
                                                                                                        • sqlite3_value_text16.SQLITE3 ref: 60925100
                                                                                                        • sqlite3_value_text16.SQLITE3 ref: 6092512C
                                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6092513E
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_value_text16$sqlite3_logsqlite3_mutex_entersqlite3_mutex_leave
                                                                                                        • String ID: library routine called out of sequence$out of memory
                                                                                                        • API String ID: 2019783549-3029887290
                                                                                                        • Opcode ID: bf8b25fefa583efc99e02b0fe9019e927645d1a19242a42ec125398c6bed8d9e
                                                                                                        • Instruction ID: f6310061860eb79c45c0a7b6efb00bde58ba827c5a391e7df96a4cb3fbc4cfa9
                                                                                                        • Opcode Fuzzy Hash: bf8b25fefa583efc99e02b0fe9019e927645d1a19242a42ec125398c6bed8d9e
                                                                                                        • Instruction Fuzzy Hash: 81014C70A083049BDB14AF69C9C170EBBE6BF64248F0488A9EC958F30EE775D8818B51
                                                                                                        APIs
                                                                                                        • sqlite3_finalize.SQLITE3 ref: 609406E3
                                                                                                          • Part of subcall function 6094064B: sqlite3_log.SQLITE3 ref: 60940672
                                                                                                          • Part of subcall function 6094064B: sqlite3_log.SQLITE3 ref: 60940696
                                                                                                        • sqlite3_free.SQLITE3 ref: 609406F7
                                                                                                        • sqlite3_free.SQLITE3 ref: 60940705
                                                                                                        • sqlite3_free.SQLITE3 ref: 60940713
                                                                                                        • sqlite3_free.SQLITE3 ref: 6094071E
                                                                                                        • sqlite3_free.SQLITE3 ref: 60940729
                                                                                                        • sqlite3_free.SQLITE3 ref: 6094073C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_free$sqlite3_log$sqlite3_finalize
                                                                                                        • String ID:
                                                                                                        • API String ID: 1159759059-0
                                                                                                        • Opcode ID: 19269ae46022e444f8470c890b78f38089a522c4155da373e534dfec766a18bc
                                                                                                        • Instruction ID: 8ceab58ab7f3fb7faec85fb80e78016d1f3d655de586deaf1cb04ee1bc4e3406
                                                                                                        • Opcode Fuzzy Hash: 19269ae46022e444f8470c890b78f38089a522c4155da373e534dfec766a18bc
                                                                                                        • Instruction Fuzzy Hash: C801E8B45447108BDB00AF78C4C5A59BBE5EF79B18F06096DECCA8B305D734D8809B91
                                                                                                        APIs
                                                                                                        • sqlite3_free.SQLITE3(?), ref: 609476DD
                                                                                                          • Part of subcall function 60904423: sqlite3_mutex_leave.SQLITE3(6090449D,?,?,?,60908270), ref: 60904446
                                                                                                        • sqlite3_log.SQLITE3 ref: 609498F5
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_freesqlite3_logsqlite3_mutex_leave
                                                                                                        • String ID: List of tree roots: $d$|
                                                                                                        • API String ID: 3709608969-1164703836
                                                                                                        • Opcode ID: 316fa83f4dc1e403b3b617744d66ff6f9af545e53e2752a9ff9486d467efffaf
                                                                                                        • Instruction ID: c91562837ba2d96ae21b52ab8334c840e7cbe23d8154f1acff92b465618a0bd4
                                                                                                        • Opcode Fuzzy Hash: 316fa83f4dc1e403b3b617744d66ff6f9af545e53e2752a9ff9486d467efffaf
                                                                                                        • Instruction Fuzzy Hash: 3FE10570A043698BDB22CF18C88179DFBBABF65304F1185D9E858AB251D775DE81CF81
                                                                                                        APIs
                                                                                                          • Part of subcall function 6095FFB2: sqlite3_bind_int64.SQLITE3 ref: 6095FFFA
                                                                                                          • Part of subcall function 6095FFB2: sqlite3_step.SQLITE3 ref: 60960009
                                                                                                          • Part of subcall function 6095FFB2: sqlite3_reset.SQLITE3 ref: 60960019
                                                                                                          • Part of subcall function 6095FFB2: sqlite3_result_error_code.SQLITE3 ref: 60960043
                                                                                                        • sqlite3_column_int64.SQLITE3 ref: 609600BA
                                                                                                        • sqlite3_column_text.SQLITE3 ref: 609600EF
                                                                                                        • sqlite3_free.SQLITE3 ref: 6096029A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_bind_int64sqlite3_column_int64sqlite3_column_textsqlite3_freesqlite3_resetsqlite3_result_error_codesqlite3_step
                                                                                                        • String ID: e
                                                                                                        • API String ID: 786425071-4024072794
                                                                                                        • Opcode ID: 373422d03c3c71c2ddc35291c61dfb2213fd8f263c0b9a30c36f02d650250dc2
                                                                                                        • Instruction ID: e80500568aa73e744b5c90812a7938b6c4ac38b40afb48beb036dafaf3e7d002
                                                                                                        • Opcode Fuzzy Hash: 373422d03c3c71c2ddc35291c61dfb2213fd8f263c0b9a30c36f02d650250dc2
                                                                                                        • Instruction Fuzzy Hash: 6291E270A18609CFDB04CF99C494B9EBBF2BF98314F108529E869AB354D774E885CF91
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_exec
                                                                                                        • String ID: sqlite_master$sqlite_temp_master$|
                                                                                                        • API String ID: 2141490097-2247242311
                                                                                                        • Opcode ID: 0e32379bf9c90bcee3e658b343db186d73978ee403121efd96d42beb4ff38922
                                                                                                        • Instruction ID: 9143400cfb6dc20a8edc2ca7c04099347fc9d468871a1d2187ae3123f936d49a
                                                                                                        • Opcode Fuzzy Hash: 0e32379bf9c90bcee3e658b343db186d73978ee403121efd96d42beb4ff38922
                                                                                                        • Instruction Fuzzy Hash: C551B6B09083289BDB26CF18C885799BBFABF59304F108599E498A7351D775DA84CF41
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_free$memcmpsqlite3_realloc
                                                                                                        • String ID:
                                                                                                        • API String ID: 3422960571-0
                                                                                                        • Opcode ID: 50eda45380483794e32bdd730fc6b6b580c41d30328003452ec2c22d7d846426
                                                                                                        • Instruction ID: 3b390e38dde49c5924589a602beaf2ee173d98914be71c714148da16d267e2cf
                                                                                                        • Opcode Fuzzy Hash: 50eda45380483794e32bdd730fc6b6b580c41d30328003452ec2c22d7d846426
                                                                                                        • Instruction Fuzzy Hash: 42B1D0B4E142189BEB05CFA9C5807DDBBF6BFA8304F148429E858A7344D374E946CF91
                                                                                                        APIs
                                                                                                          • Part of subcall function 6090A0D5: sqlite3_free.SQLITE3 ref: 6090A118
                                                                                                        • sqlite3_malloc.SQLITE3 ref: 6094B1D1
                                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 6094B24C
                                                                                                        • sqlite3_malloc.SQLITE3 ref: 6094B272
                                                                                                        • sqlite3_value_blob.SQLITE3 ref: 6094B298
                                                                                                        • sqlite3_free.SQLITE3 ref: 6094B2C8
                                                                                                          • Part of subcall function 6094A894: sqlite3_bind_int64.SQLITE3 ref: 6094A8C0
                                                                                                          • Part of subcall function 6094A894: sqlite3_step.SQLITE3 ref: 6094A8CE
                                                                                                          • Part of subcall function 6094A894: sqlite3_column_int64.SQLITE3 ref: 6094A8E9
                                                                                                          • Part of subcall function 6094A894: sqlite3_reset.SQLITE3 ref: 6094A90F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_freesqlite3_malloc$sqlite3_bind_int64sqlite3_column_int64sqlite3_resetsqlite3_stepsqlite3_value_blobsqlite3_value_bytes
                                                                                                        • String ID:
                                                                                                        • API String ID: 683514883-0
                                                                                                        • Opcode ID: 3036fcfce1ee653ed62d56f61367963e4d2afc4bfe1ca560103df060be3b8356
                                                                                                        • Instruction ID: 83940ce9cf0a2bab7a741171fc95cc3a005d2848f59039768723a80715f2adcb
                                                                                                        • Opcode Fuzzy Hash: 3036fcfce1ee653ed62d56f61367963e4d2afc4bfe1ca560103df060be3b8356
                                                                                                        • Instruction Fuzzy Hash: E19133B1A052099FCB04CFA9D490B9EBBF6FF68314F108569E855AB341DB34ED81CB91
                                                                                                        APIs
                                                                                                        • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,6093A8DF), ref: 6093A200
                                                                                                        • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,6093A8DF), ref: 6093A391
                                                                                                        • sqlite3_mutex_free.SQLITE3(?,?,?,?,?,?,?,?,6093A8DF), ref: 6093A3A3
                                                                                                        • sqlite3_free.SQLITE3 ref: 6093A3BA
                                                                                                        • sqlite3_free.SQLITE3 ref: 6093A3C2
                                                                                                          • Part of subcall function 6093A0C5: sqlite3_mutex_enter.SQLITE3 ref: 6093A114
                                                                                                          • Part of subcall function 6093A0C5: sqlite3_mutex_free.SQLITE3 ref: 6093A152
                                                                                                          • Part of subcall function 6093A0C5: sqlite3_mutex_leave.SQLITE3 ref: 6093A162
                                                                                                          • Part of subcall function 6093A0C5: sqlite3_free.SQLITE3 ref: 6093A1A4
                                                                                                          • Part of subcall function 6093A0C5: sqlite3_free.SQLITE3 ref: 6093A1C3
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_free$sqlite3_mutex_leave$sqlite3_mutex_free$sqlite3_mutex_enter
                                                                                                        • String ID:
                                                                                                        • API String ID: 1903298374-0
                                                                                                        • Opcode ID: 8530df85f137a660efabd51ca86f4821d2fdcc6d7a3fd2cfb4f5547b241dda56
                                                                                                        • Instruction ID: f6c450fbbadf2e04ab128defb7df19fdb2a161b4e6cf4e71623f80625393026f
                                                                                                        • Opcode Fuzzy Hash: 8530df85f137a660efabd51ca86f4821d2fdcc6d7a3fd2cfb4f5547b241dda56
                                                                                                        • Instruction Fuzzy Hash: EB513870A047218BDB58DF69C8C074AB7A6BF65318F05896CECA69B305D735EC41CF91
                                                                                                        APIs
                                                                                                          • Part of subcall function 60904396: sqlite3_mutex_try.SQLITE3(?,?,?,60908235), ref: 609043B8
                                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 6093A114
                                                                                                        • sqlite3_mutex_free.SQLITE3 ref: 6093A152
                                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6093A162
                                                                                                        • sqlite3_free.SQLITE3 ref: 6093A1A4
                                                                                                        • sqlite3_free.SQLITE3 ref: 6093A1C3
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_free$sqlite3_mutex_entersqlite3_mutex_freesqlite3_mutex_leavesqlite3_mutex_try
                                                                                                        • String ID:
                                                                                                        • API String ID: 1894464702-0
                                                                                                        • Opcode ID: 7188b9a67afd66d207271078c150a83da37f36a2752b1b5804700c826a798ba9
                                                                                                        • Instruction ID: 8ebadd1dc7ee404a0f141fd21885e91e0aa1156a5a6df10951b92a0b718128ce
                                                                                                        • Opcode Fuzzy Hash: 7188b9a67afd66d207271078c150a83da37f36a2752b1b5804700c826a798ba9
                                                                                                        • Instruction Fuzzy Hash: CF313C70B086118BDB18DF79C8C1A1A7BFBBFB2704F148468E8418B219EB35DC419F91
                                                                                                        APIs
                                                                                                          • Part of subcall function 60925326: sqlite3_log.SQLITE3 ref: 60925352
                                                                                                        • sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,609254CC), ref: 6092538E
                                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 609253C4
                                                                                                        • sqlite3_log.SQLITE3 ref: 609253E2
                                                                                                        • sqlite3_log.SQLITE3 ref: 60925406
                                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 60925443
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_log$sqlite3_mutex_leave$sqlite3_mutex_enter
                                                                                                        • String ID:
                                                                                                        • API String ID: 3336957480-0
                                                                                                        • Opcode ID: 1198911827aa14b9fab328e6e7c73bc961b2278be0ca20fe6461460b1b30ceeb
                                                                                                        • Instruction ID: a100dd02d465b32589d57b5b9efe4db3cd483c3b5de54de748c9b161d5d001e2
                                                                                                        • Opcode Fuzzy Hash: 1198911827aa14b9fab328e6e7c73bc961b2278be0ca20fe6461460b1b30ceeb
                                                                                                        • Instruction Fuzzy Hash: D3315A70228704DBDB00EF28D49575ABBE6AFA1358F00886DE9948F36DD778C885DB02
                                                                                                        APIs
                                                                                                        • sqlite3_result_blob.SQLITE3 ref: 609613D0
                                                                                                        • sqlite3_column_int.SQLITE3 ref: 6096143A
                                                                                                        • sqlite3_data_count.SQLITE3 ref: 60961465
                                                                                                        • sqlite3_column_value.SQLITE3 ref: 60961476
                                                                                                        • sqlite3_result_value.SQLITE3 ref: 60961482
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_column_intsqlite3_column_valuesqlite3_data_countsqlite3_result_blobsqlite3_result_value
                                                                                                        • String ID:
                                                                                                        • API String ID: 3091402450-0
                                                                                                        • Opcode ID: 15f5c91e7d752206cb5be57281081ebbda5684d1dfb7c3b21a78c03d1c189b87
                                                                                                        • Instruction ID: 8b12398a3b1f37ca0d2e1a8d549e1f0529ecbd38da511dd0edd3444da8e5cc4d
                                                                                                        • Opcode Fuzzy Hash: 15f5c91e7d752206cb5be57281081ebbda5684d1dfb7c3b21a78c03d1c189b87
                                                                                                        • Instruction Fuzzy Hash: 72314DB19082058FDB00DF29C48064EB7F6FF65354F19856AE8999B361EB34E886CF81
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_mutex_entersqlite3_mutex_leave$sqlite3_free
                                                                                                        • String ID:
                                                                                                        • API String ID: 251237202-0
                                                                                                        • Opcode ID: ee0aefbaff40cad113deb2524f723b57adfc4224f15c8691f87345bc20e459c1
                                                                                                        • Instruction ID: 8e14962182cb4ba31828fc05f1b37fa5954e33605a362b2e641de35f96add61e
                                                                                                        • Opcode Fuzzy Hash: ee0aefbaff40cad113deb2524f723b57adfc4224f15c8691f87345bc20e459c1
                                                                                                        • Instruction Fuzzy Hash: 022137B46087158BC709AF68C48570ABBF6FFA5318F10895DEC958B345DB74E940CB82
                                                                                                        APIs
                                                                                                        • sqlite3_aggregate_context.SQLITE3 ref: 6091A31E
                                                                                                        • sqlite3_value_text.SQLITE3 ref: 6091A349
                                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 6091A356
                                                                                                        • sqlite3_value_text.SQLITE3 ref: 6091A37B
                                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 6091A387
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_value_bytessqlite3_value_text$sqlite3_aggregate_context
                                                                                                        • String ID:
                                                                                                        • API String ID: 4225432645-0
                                                                                                        • Opcode ID: e7dd5294350f58c57afd4f2551108a775ab72f2657aaaf635efeb712e258985e
                                                                                                        • Instruction ID: 24a20a1669ecabf1c8c9e0f75de4e20f6480f0c3e20d7f4799920e66bb4c3c2a
                                                                                                        • Opcode Fuzzy Hash: e7dd5294350f58c57afd4f2551108a775ab72f2657aaaf635efeb712e258985e
                                                                                                        • Instruction Fuzzy Hash: 3F21CF71B086588FDB009F29C48075E7BE7AFA4254F0484A8E894CF305EB34DC86CB91
                                                                                                        APIs
                                                                                                        • sqlite3_mutex_enter.SQLITE3(?,-00000200,?), ref: 6090359D
                                                                                                        • sqlite3_mutex_leave.SQLITE3(?,-00000200,?), ref: 609035E0
                                                                                                        • sqlite3_mutex_enter.SQLITE3(?,-00000200,?), ref: 609035F9
                                                                                                        • sqlite3_mutex_leave.SQLITE3(?,-00000200,?), ref: 60903614
                                                                                                        • sqlite3_free.SQLITE3(?,-00000200,?), ref: 6090361C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_mutex_entersqlite3_mutex_leave$sqlite3_free
                                                                                                        • String ID:
                                                                                                        • API String ID: 251237202-0
                                                                                                        • Opcode ID: d176fa110bd2286076a254f1a84b89a7a2b75649dc4a807f2bdee778eef171d4
                                                                                                        • Instruction ID: 98a7ce7f1ce2ff6a0e5ca4ca87ec4bf20a5c319c62b2fc6798152503390b0136
                                                                                                        • Opcode Fuzzy Hash: d176fa110bd2286076a254f1a84b89a7a2b75649dc4a807f2bdee778eef171d4
                                                                                                        • Instruction Fuzzy Hash: B211FE725186218BCB00EF7DC8C16197FE7FB66358F01491DE866D7362D73AD480AB42
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_log
                                                                                                        • String ID: ($string or blob too big$|
                                                                                                        • API String ID: 632333372-2398534278
                                                                                                        • Opcode ID: 03236f3895d5fd10e60d1ff1eefb6ed02231b27a1c47450c0fb49d2dd58edd91
                                                                                                        • Instruction ID: 3c3a64a58f66130c0c9aec06ea77be0954bd7b4098f3428da06b6372deec6608
                                                                                                        • Opcode Fuzzy Hash: 03236f3895d5fd10e60d1ff1eefb6ed02231b27a1c47450c0fb49d2dd58edd91
                                                                                                        • Instruction Fuzzy Hash: 5DC10CB5A043288FCB66CF28C981789B7BABB59304F1085D9E958A7345C775EF81CF40
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_stricmp
                                                                                                        • String ID: BINARY
                                                                                                        • API String ID: 912767213-907554435
                                                                                                        • Opcode ID: dd54eeba7b99beb4c129e1ce0ebb3c97c4d31291de79a9977aa1c0a9ff3222ee
                                                                                                        • Instruction ID: 142a1e9d4f1e8552d2c1f4074703eb5ae9f1e70d76b7ded3e689f9c37387bea1
                                                                                                        • Opcode Fuzzy Hash: dd54eeba7b99beb4c129e1ce0ebb3c97c4d31291de79a9977aa1c0a9ff3222ee
                                                                                                        • Instruction Fuzzy Hash: 11512AB8A142159FCF05CF68D580A9EBBFBBFA9314F208569D855AB318D335EC41CB90
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Virtual$Protect$Query
                                                                                                        • String ID: @
                                                                                                        • API String ID: 3618607426-2766056989
                                                                                                        • Opcode ID: a11a59528d98c4ff7ad69dfbc7d520f68a8f714e9ef4c31244658d91e7757f1c
                                                                                                        • Instruction ID: 11fd3fd6c91f2e29dbdaed7331fdf7a08ef8f1da01c53322037319a40d79a89e
                                                                                                        • Opcode Fuzzy Hash: a11a59528d98c4ff7ad69dfbc7d520f68a8f714e9ef4c31244658d91e7757f1c
                                                                                                        • Instruction Fuzzy Hash: 003141B5E15208AFEB14DFA9D48158EFFF5EF99254F10852AE868E3310E371D940CB52
                                                                                                        APIs
                                                                                                        • sqlite3_malloc.SQLITE3 ref: 60928353
                                                                                                          • Part of subcall function 60916FBA: sqlite3_initialize.SQLITE3(60912743,?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5), ref: 60916FC4
                                                                                                        • sqlite3_realloc.SQLITE3 ref: 609283A0
                                                                                                        • sqlite3_free.SQLITE3 ref: 609283B6
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_freesqlite3_initializesqlite3_mallocsqlite3_realloc
                                                                                                        • String ID: d
                                                                                                        • API String ID: 211589378-2564639436
                                                                                                        • Opcode ID: 4c34ce46e3d0a3d1d3def0d8ad382c8948c40f702370fc4fcdce263753dde11a
                                                                                                        • Instruction ID: 0830c2115c9ea807631a831f7f1165b0ee40d8a8a94356aa67113494a68d5982
                                                                                                        • Opcode Fuzzy Hash: 4c34ce46e3d0a3d1d3def0d8ad382c8948c40f702370fc4fcdce263753dde11a
                                                                                                        • Instruction Fuzzy Hash: 222137B0A04205CFDB14DF59D4C078ABBF6FF69314F158469D8889B309E3B8E841CBA1
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressHandleModuleProc
                                                                                                        • String ID: _Jv_RegisterClasses$libgcj-11.dll
                                                                                                        • API String ID: 1646373207-2713375476
                                                                                                        • Opcode ID: 84d528d321f1eea6d8a1b68cb749bb1a2441192a5c5952381cf667fabd413772
                                                                                                        • Instruction ID: e6822cb61b404b68644b44a252d8259deade1a358cfa59fcc717d95409d4d83a
                                                                                                        • Opcode Fuzzy Hash: 84d528d321f1eea6d8a1b68cb749bb1a2441192a5c5952381cf667fabd413772
                                                                                                        • Instruction Fuzzy Hash: 0DE04F7062D30586FB443F794D923297AEB5F72549F00081CD9929B240EBB4D440D753
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_free
                                                                                                        • String ID:
                                                                                                        • API String ID: 2313487548-0
                                                                                                        • Opcode ID: 17c4197e66eccf8e4e539c70c01e6b2d08fb8491bcf73b2b2b780fd64eb57762
                                                                                                        • Instruction ID: 4e09bb13dd5a3c3c1d339de95b14bc5918580ae4e3dbdcf066e72e084d482625
                                                                                                        • Opcode Fuzzy Hash: 17c4197e66eccf8e4e539c70c01e6b2d08fb8491bcf73b2b2b780fd64eb57762
                                                                                                        • Instruction Fuzzy Hash: 15E14674928209EFDB04CF94D184B9EBBB2FF69304F208558D8956B259D774EC86CF81
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: sqlite_master$sqlite_sequence$sqlite_temp_master
                                                                                                        • API String ID: 0-1177837799
                                                                                                        • Opcode ID: b45b6970ebe54efa46efcb65f0e1138f7cff2b55d537d73117a3441f01693427
                                                                                                        • Instruction ID: e5240d50caebec33bd4ce83d4b9fb982fe545a794019e3d400788b6e3ec19482
                                                                                                        • Opcode Fuzzy Hash: b45b6970ebe54efa46efcb65f0e1138f7cff2b55d537d73117a3441f01693427
                                                                                                        • Instruction Fuzzy Hash: F7C13974B062089BDB05DF68D49179EBBF3AFA8308F14C42DE8899B345DB39D841CB41
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_freesqlite3_mallocsqlite3_value_bytessqlite3_value_text
                                                                                                        • String ID:
                                                                                                        • API String ID: 1648232842-0
                                                                                                        • Opcode ID: 6f401334500cf3ce8937f97dce09bc9131fc1f686c7391f4db805f1c2cabf22c
                                                                                                        • Instruction ID: a01add595a6c287de5924383f0ed77e5cc34082cd65fcd393cbe5beac3228527
                                                                                                        • Opcode Fuzzy Hash: 6f401334500cf3ce8937f97dce09bc9131fc1f686c7391f4db805f1c2cabf22c
                                                                                                        • Instruction Fuzzy Hash: 4531C0B4A042058FDB04DF29C094B5ABBE2FF98354F1484A9EC498F349D779E846CBA0
                                                                                                        APIs
                                                                                                        • sqlite3_step.SQLITE3 ref: 609614AB
                                                                                                        • sqlite3_reset.SQLITE3 ref: 609614BF
                                                                                                          • Part of subcall function 60941C40: sqlite3_mutex_enter.SQLITE3 ref: 60941C58
                                                                                                          • Part of subcall function 60941C40: sqlite3_mutex_leave.SQLITE3 ref: 60941CBE
                                                                                                        • sqlite3_column_int64.SQLITE3 ref: 609614D4
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_column_int64sqlite3_mutex_entersqlite3_mutex_leavesqlite3_resetsqlite3_step
                                                                                                        • String ID:
                                                                                                        • API String ID: 3429445273-0
                                                                                                        • Opcode ID: 44b7ea0f60ccad0bdb665534712f35195a3185c30aa33eaed9220a178cd48643
                                                                                                        • Instruction ID: 62863439de2fabb71fd3664abc4fbfc11ff04353a6e6e3e42574d1c19fb7889d
                                                                                                        • Opcode Fuzzy Hash: 44b7ea0f60ccad0bdb665534712f35195a3185c30aa33eaed9220a178cd48643
                                                                                                        • Instruction Fuzzy Hash: AE316470A183408BEF15CF69C1C5749FBA6AFA7348F188599DC864F30AD375D884C752
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_snprintf$sqlite3_stricmpsqlite3_value_text
                                                                                                        • String ID:
                                                                                                        • API String ID: 1035992805-0
                                                                                                        • Opcode ID: 213593095aed0ecc64844f89ed1f3878beaaf7633e295caa013ed5846923251b
                                                                                                        • Instruction ID: 84d28b158f1a11e063f70be148de9c7b2eff514b3bcf7808f17aa895500be78a
                                                                                                        • Opcode Fuzzy Hash: 213593095aed0ecc64844f89ed1f3878beaaf7633e295caa013ed5846923251b
                                                                                                        • Instruction Fuzzy Hash: 8C3178B0A08324DFEB24CF28C481B4ABBF6FBA5318F04C499E4888B251C775D885DF42
                                                                                                        APIs
                                                                                                        • sqlite3_mutex_enter.SQLITE3(-00000200,?,?,6090B22B), ref: 609034D8
                                                                                                        • sqlite3_mutex_leave.SQLITE3(-00000200,?,?,6090B22B), ref: 60903521
                                                                                                        • sqlite3_mutex_enter.SQLITE3(-00000200,?,?,6090B22B), ref: 6090354A
                                                                                                        • sqlite3_mutex_leave.SQLITE3(-00000200,?,?,6090B22B), ref: 60903563
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_mutex_entersqlite3_mutex_leave
                                                                                                        • String ID:
                                                                                                        • API String ID: 1477753154-0
                                                                                                        • Opcode ID: cc0b0c4414a91b2c8747a1fff16426ed14613a144e31e5ae299e51467139190c
                                                                                                        • Instruction ID: 848dca46e936c6e01d33e08870ae11aa620bd8b24bdb606da7ea596206f2e213
                                                                                                        • Opcode Fuzzy Hash: cc0b0c4414a91b2c8747a1fff16426ed14613a144e31e5ae299e51467139190c
                                                                                                        • Instruction Fuzzy Hash: 44111F726186218FDB00EF7DC8817597FEAFB66308F00842DE865E7362E779D8819741
                                                                                                        APIs
                                                                                                        • sqlite3_initialize.SQLITE3 ref: 6092A450
                                                                                                          • Part of subcall function 60912453: sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 609124D1
                                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 6092A466
                                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6092A47F
                                                                                                        • sqlite3_memory_used.SQLITE3 ref: 6092A4BA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_mutex_enter$sqlite3_initializesqlite3_memory_usedsqlite3_mutex_leave
                                                                                                        • String ID:
                                                                                                        • API String ID: 2673540737-0
                                                                                                        • Opcode ID: 58333c90df1895ca2798dafcbab41657529afc007f85020e925d8580cfdcdfcb
                                                                                                        • Instruction ID: c4988029ba64cfb2248a7cf0c790324acf4c13eb0f9cd3f15fdedc175ef3c91a
                                                                                                        • Opcode Fuzzy Hash: 58333c90df1895ca2798dafcbab41657529afc007f85020e925d8580cfdcdfcb
                                                                                                        • Instruction Fuzzy Hash: F9019276E143148BCB00EF79D88561ABFE7FBA5324F008528EC9497364E735DC408B81
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_value_text$sqlite3_freesqlite3_load_extension
                                                                                                        • String ID:
                                                                                                        • API String ID: 3526213481-0
                                                                                                        • Opcode ID: e69664dddad2286ff6ed0cb1f1c7a121e5262b7aa8061cf10291ac83704fea4b
                                                                                                        • Instruction ID: 98199466554994e62e20ad809be6129e3c08b78dd6d8c38fc18f61524e73aad2
                                                                                                        • Opcode Fuzzy Hash: e69664dddad2286ff6ed0cb1f1c7a121e5262b7aa8061cf10291ac83704fea4b
                                                                                                        • Instruction Fuzzy Hash: 4101E9B5A043059BCB00EF69D485AAFBBF5EF68654F10C529EC9497304E774D841CF91
                                                                                                        APIs
                                                                                                        • sqlite3_prepare.SQLITE3 ref: 60969166
                                                                                                        • sqlite3_errmsg.SQLITE3 ref: 60969172
                                                                                                          • Part of subcall function 609258A8: sqlite3_log.SQLITE3 ref: 609258E5
                                                                                                        • sqlite3_errcode.SQLITE3 ref: 6096918A
                                                                                                          • Part of subcall function 609251AA: sqlite3_log.SQLITE3 ref: 609251E8
                                                                                                        • sqlite3_step.SQLITE3 ref: 60969197
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_log$sqlite3_errcodesqlite3_errmsgsqlite3_preparesqlite3_step
                                                                                                        • String ID:
                                                                                                        • API String ID: 2877408194-0
                                                                                                        • Opcode ID: 06185e76a961c89383dca1620ea17d5683e825aa4cba78efc797247d66345ea8
                                                                                                        • Instruction ID: d4ebd4c9a05a553e526e78eaaf80584f3afcfe73b3175c4c6dada352db343273
                                                                                                        • Opcode Fuzzy Hash: 06185e76a961c89383dca1620ea17d5683e825aa4cba78efc797247d66345ea8
                                                                                                        • Instruction Fuzzy Hash: 9F0186B091C3059BE700EF29C88525DFBE9EFA5314F11892DA89987384E734C940CB86
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_freesqlite3_mprintfsqlite3_value_blobsqlite3_value_bytes
                                                                                                        • String ID:
                                                                                                        • API String ID: 1163609955-0
                                                                                                        • Opcode ID: c446836a4840d302dbdc97fcf3f25a19881b43244be54ce00609cbc101420811
                                                                                                        • Instruction ID: 8e0d1a1b7fe9adeaf330fda5a565ce202833de3a42fcd494fa905fee92021967
                                                                                                        • Opcode Fuzzy Hash: c446836a4840d302dbdc97fcf3f25a19881b43244be54ce00609cbc101420811
                                                                                                        • Instruction Fuzzy Hash: F6F0C8716282145FC3106F3994816697BE6DFA6758F0144A9F584CB314DB75CC82C742
                                                                                                        APIs
                                                                                                        • sqlite3_prepare_v2.SQLITE3 ref: 609615BA
                                                                                                        • sqlite3_step.SQLITE3 ref: 609615C9
                                                                                                        • sqlite3_column_int.SQLITE3 ref: 609615E1
                                                                                                          • Part of subcall function 6091D4F4: sqlite3_value_int.SQLITE3 ref: 6091D50C
                                                                                                        • sqlite3_finalize.SQLITE3 ref: 609615EE
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_column_intsqlite3_finalizesqlite3_prepare_v2sqlite3_stepsqlite3_value_int
                                                                                                        • String ID:
                                                                                                        • API String ID: 4265739436-0
                                                                                                        • Opcode ID: edb1a347b7ee41d63e69a54b369763b34702b79c0c254a7699785c0090147395
                                                                                                        • Instruction ID: 970f7a8085286b868af170b9ae73916577c28f03d50975cfa6e3c5bd991c66ad
                                                                                                        • Opcode Fuzzy Hash: edb1a347b7ee41d63e69a54b369763b34702b79c0c254a7699785c0090147395
                                                                                                        • Instruction Fuzzy Hash: BE01E4B0D083049BEB10EF69C58575EFBF9EFA5314F00896DE8A997380E775D9408B82
                                                                                                        APIs
                                                                                                        • sqlite3_initialize.SQLITE3 ref: 6092A638
                                                                                                          • Part of subcall function 60912453: sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 609124D1
                                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 6092A64F
                                                                                                        • strcmp.MSVCRT ref: 6092A66A
                                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6092A67D
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_mutex_enter$sqlite3_initializesqlite3_mutex_leavestrcmp
                                                                                                        • String ID:
                                                                                                        • API String ID: 1894734062-0
                                                                                                        • Opcode ID: 1480f87154849f1cdf239baa72c9ff1b5e3c835899009c68b4affe8256d9fce5
                                                                                                        • Instruction ID: 0dacd04717b96a229033e5bf385d74358d6efc238696297f04088f4a0acd15ee
                                                                                                        • Opcode Fuzzy Hash: 1480f87154849f1cdf239baa72c9ff1b5e3c835899009c68b4affe8256d9fce5
                                                                                                        • Instruction Fuzzy Hash: EBF0B4726243044BC7006F799CC164A7FAEEEB1298B05802CEC548B319EB35DC0297A1
                                                                                                        APIs
                                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 609084E9
                                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 60908518
                                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 60908528
                                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6090855B
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_mutex_entersqlite3_mutex_leave
                                                                                                        • String ID:
                                                                                                        • API String ID: 1477753154-0
                                                                                                        • Opcode ID: dbb0a767127359d75753d9f151f7b9e03affe710ab86404e29d94d971225fba8
                                                                                                        • Instruction ID: c41a4d3f3efa942db11cbd34a9101edfe28f26dd6f673ba1da0d5803e4a0adbd
                                                                                                        • Opcode Fuzzy Hash: dbb0a767127359d75753d9f151f7b9e03affe710ab86404e29d94d971225fba8
                                                                                                        • Instruction Fuzzy Hash: FD01A4B05093048BDB40AF25C5D97CABBA5EF15718F0884BDEC894F34AD7B9D5448BA1
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_log
                                                                                                        • String ID: into$out of
                                                                                                        • API String ID: 632333372-1114767565
                                                                                                        • Opcode ID: 05e60a680804dc8d75cc30d301a58b6784d3cbcabfb13c7dcba40214300a3b29
                                                                                                        • Instruction ID: de20b162988cb891a2f8fbcf22309076e3e21d241eadb06c465d82de9f0e8d92
                                                                                                        • Opcode Fuzzy Hash: 05e60a680804dc8d75cc30d301a58b6784d3cbcabfb13c7dcba40214300a3b29
                                                                                                        • Instruction Fuzzy Hash: 91910170A043149BDB26CF28C88175EBBBABF65308F0481E9E858AB355D7B5DE85CF41
                                                                                                        APIs
                                                                                                          • Part of subcall function 60918408: sqlite3_value_text.SQLITE3 ref: 60918426
                                                                                                        • sqlite3_free.SQLITE3 ref: 609193A3
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_freesqlite3_value_text
                                                                                                        • String ID: (NULL)$NULL
                                                                                                        • API String ID: 2175239460-873412390
                                                                                                        • Opcode ID: 2d639d8f8789be8f4f2115c7e339461789bfa1512606a4b94e85873a15b94a2d
                                                                                                        • Instruction ID: 63658e955800b40111a930d2026d12727b3b294c4be858d68b3f7c51d7abf176
                                                                                                        • Opcode Fuzzy Hash: 2d639d8f8789be8f4f2115c7e339461789bfa1512606a4b94e85873a15b94a2d
                                                                                                        • Instruction Fuzzy Hash: E3514B31F0825A8EEB258A68C89479DBBB6BF66304F1441E9C4A9AB241D7309DC6CF01
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_log
                                                                                                        • String ID: -- $d
                                                                                                        • API String ID: 632333372-777087308
                                                                                                        • Opcode ID: 2197877c990d2cc598be623123ad695ba2ed3a88a0fc98749b4c643aad0a3996
                                                                                                        • Instruction ID: d45f625f7ed72e8bd0cbe86fb5af212c953cff4c7e5ffbb26f6c4a79540968e1
                                                                                                        • Opcode Fuzzy Hash: 2197877c990d2cc598be623123ad695ba2ed3a88a0fc98749b4c643aad0a3996
                                                                                                        • Instruction Fuzzy Hash: FB51F674A043689BDB26CF28C980789BBFABF55304F1481D9E89CAB341C7759E85CF40
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_log
                                                                                                        • String ID: string or blob too big$|
                                                                                                        • API String ID: 632333372-330586046
                                                                                                        • Opcode ID: b6301cf988e6664baaa8b4960c9a349f418ad1f33ca54faa928bbeacb0d503e6
                                                                                                        • Instruction ID: 65a9847582dc10a4f4f17f1c4fc8d82f10366072c52f03016cacc5a11d353e3e
                                                                                                        • Opcode Fuzzy Hash: b6301cf988e6664baaa8b4960c9a349f418ad1f33ca54faa928bbeacb0d503e6
                                                                                                        • Instruction Fuzzy Hash: 4D51B9749083689BCB22CF28C985789BBF6BF59314F1086D9E49897351C775EE81CF41
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_log
                                                                                                        • String ID: d$|
                                                                                                        • API String ID: 632333372-415524447
                                                                                                        • Opcode ID: b41da94c8e0873fb31ce46b9bf1ec845f2d469f37e36bd2a55cc8f8885e561b5
                                                                                                        • Instruction ID: dac03e427e93f591f5d1737f90c886445feec93ea56e6f6f32424ebbe55d5cce
                                                                                                        • Opcode Fuzzy Hash: b41da94c8e0873fb31ce46b9bf1ec845f2d469f37e36bd2a55cc8f8885e561b5
                                                                                                        • Instruction Fuzzy Hash: 50510970A04329DBDB26CF19C981799BBBABF55308F0481D9E958AB341D735EE81CF41
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_logsqlite3_value_text
                                                                                                        • String ID: string or blob too big
                                                                                                        • API String ID: 2320820228-2803948771
                                                                                                        • Opcode ID: 4552165c49a92a3f1eebbde7746405f837ee0ef0562a3825501d2540ddfe4a5c
                                                                                                        • Instruction ID: 1f8da1134a73d261049fdcd83983d84c916c8a3f87851362e697cdb17b1d2bab
                                                                                                        • Opcode Fuzzy Hash: 4552165c49a92a3f1eebbde7746405f837ee0ef0562a3825501d2540ddfe4a5c
                                                                                                        • Instruction Fuzzy Hash: F631D9B0A083249BCB25DF28C881799B7FABF69304F0085DAE898A7301D775DE81CF45
                                                                                                        APIs
                                                                                                        • sqlite3_aggregate_context.SQLITE3 ref: 60914096
                                                                                                        • sqlite3_value_numeric_type.SQLITE3 ref: 609140A2
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_aggregate_contextsqlite3_value_numeric_type
                                                                                                        • String ID:
                                                                                                        • API String ID: 3265351223-3916222277
                                                                                                        • Opcode ID: 46809e466d9dc696839b8d734d1d71a7cd961db8d22299a3a9f395bc6b436a6c
                                                                                                        • Instruction ID: a3c0f903ff645dd1c5a8146eaa2078e963ad6c1b8d1bbf61d5d4caeb1888773d
                                                                                                        • Opcode Fuzzy Hash: 46809e466d9dc696839b8d734d1d71a7cd961db8d22299a3a9f395bc6b436a6c
                                                                                                        • Instruction Fuzzy Hash: 19119EB0A0C6589BDF059F69C4D539A7BF6AF39308F0044E8D8D08B205E771CD94CB81
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_stricmp
                                                                                                        • String ID: log
                                                                                                        • API String ID: 912767213-2403297477
                                                                                                        • Opcode ID: 32625358f7d37366d1c1d188942de81712d107425b8b720a67b4b84d1adec0cd
                                                                                                        • Instruction ID: cbf508da25866b0a35bc2ca480d64d7c482f0664b0359b741109bd545b4f9ff5
                                                                                                        • Opcode Fuzzy Hash: 32625358f7d37366d1c1d188942de81712d107425b8b720a67b4b84d1adec0cd
                                                                                                        • Instruction Fuzzy Hash: FD11DAB07087048BE725AF66C49535EBBB3ABA1708F10C42CE4854B784C7BAC986DB42
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_strnicmp
                                                                                                        • String ID: SQLITE_
                                                                                                        • API String ID: 1961171630-787686576
                                                                                                        • Opcode ID: 6b56a851e7df47422a7a29131339b4dfcb3302745a705f9abe90012807219487
                                                                                                        • Instruction ID: 6d5ef3c0fd507030b5e8170497320435726bf3f0db30f2d6f2734bcd7f756fb3
                                                                                                        • Opcode Fuzzy Hash: 6b56a851e7df47422a7a29131339b4dfcb3302745a705f9abe90012807219487
                                                                                                        • Instruction Fuzzy Hash: 2501D6B190C3505FD7419F29CC8075BBFFAEBA5258F10486DE89687212D374DC81D781
                                                                                                        APIs
                                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 6091A1DB
                                                                                                        • sqlite3_value_blob.SQLITE3 ref: 6091A1FA
                                                                                                        Strings
                                                                                                        • Invalid argument to rtreedepth(), xrefs: 6091A1E3
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_value_blobsqlite3_value_bytes
                                                                                                        • String ID: Invalid argument to rtreedepth()
                                                                                                        • API String ID: 1063208240-2843521569
                                                                                                        • Opcode ID: 11a8b631faa983fdd1b04a57150add771201859657fb9a8a7ca9793758d49f10
                                                                                                        • Instruction ID: c9489564a96cd83e586e3a08c251b8a8c74d553169181c25a19da25ffef599d7
                                                                                                        • Opcode Fuzzy Hash: 11a8b631faa983fdd1b04a57150add771201859657fb9a8a7ca9793758d49f10
                                                                                                        • Instruction Fuzzy Hash: 0FF0A4B2A0C2589BDB00AF2CC88255577A6FF24258F1045D9E9858F306EB34DDD5C7D1
                                                                                                        APIs
                                                                                                        • sqlite3_soft_heap_limit64.SQLITE3 ref: 609561D7
                                                                                                          • Part of subcall function 6092A43E: sqlite3_initialize.SQLITE3 ref: 6092A450
                                                                                                          • Part of subcall function 6092A43E: sqlite3_mutex_enter.SQLITE3 ref: 6092A466
                                                                                                          • Part of subcall function 6092A43E: sqlite3_mutex_leave.SQLITE3 ref: 6092A47F
                                                                                                          • Part of subcall function 6092A43E: sqlite3_memory_used.SQLITE3 ref: 6092A4BA
                                                                                                        • sqlite3_soft_heap_limit64.SQLITE3 ref: 609561EB
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_soft_heap_limit64$sqlite3_initializesqlite3_memory_usedsqlite3_mutex_entersqlite3_mutex_leave
                                                                                                        • String ID: soft_heap_limit
                                                                                                        • API String ID: 1251656441-405162809
                                                                                                        • Opcode ID: 0a3178e3d5348c0d1dba646aca47308acc52713326f376e4eba91e5107f5ba07
                                                                                                        • Instruction ID: 8891d4bbc0f5aef5547f00e3070395c34840fc2012d087b050684f6162b0ba7d
                                                                                                        • Opcode Fuzzy Hash: 0a3178e3d5348c0d1dba646aca47308acc52713326f376e4eba91e5107f5ba07
                                                                                                        • Instruction Fuzzy Hash: C2014B71A083188BC710EF98D8417ADB7F2BFA5318F508629E8A49B394D730DC42CF41
                                                                                                        APIs
                                                                                                        • sqlite3_log.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,6094A57F), ref: 6092522A
                                                                                                        • sqlite3_log.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,6094A57F), ref: 60925263
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: sqlite3_log
                                                                                                        • String ID: NULL
                                                                                                        • API String ID: 632333372-324932091
                                                                                                        • Opcode ID: f56f6a0e8a895df1b0101c46b9851dc3af9ce5b0d95800d46be4b721d61d1ab1
                                                                                                        • Instruction ID: 5a36de60e8574ea04015b231464f09686a41744340efbe7a8a869d8181b3dc96
                                                                                                        • Opcode Fuzzy Hash: f56f6a0e8a895df1b0101c46b9851dc3af9ce5b0d95800d46be4b721d61d1ab1
                                                                                                        • Instruction Fuzzy Hash: BAF0A070238301DBD7102FA6E44230E7AEBABB0798F48C43C95A84F289D7B5C844CB63
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CriticalSection$EnterLeavefree
                                                                                                        • String ID:
                                                                                                        • API String ID: 4020351045-0
                                                                                                        • Opcode ID: 13d179c58506242de641c1793229aaf6d73ae3266bd26a3d41fb94aeb54caf06
                                                                                                        • Instruction ID: 980a39aab3b848caec2c27f45d5308e77b440585e3cd6ccd446b63c63d51e1b6
                                                                                                        • Opcode Fuzzy Hash: 13d179c58506242de641c1793229aaf6d73ae3266bd26a3d41fb94aeb54caf06
                                                                                                        • Instruction Fuzzy Hash: 2D018070B293058BDB10DF28C985919BBFBABB6308B20855CE499D7355D770DC80EB62
                                                                                                        APIs
                                                                                                        • EnterCriticalSection.KERNEL32(?,?,?,6096D655,?,?,?,?,?,6096CF88), ref: 6096D4DF
                                                                                                        • TlsGetValue.KERNEL32(?,?,?,?,6096D655,?,?,?,?,?,6096CF88), ref: 6096D4F5
                                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,6096D655,?,?,?,?,?,6096CF88), ref: 6096D4FD
                                                                                                        • LeaveCriticalSection.KERNEL32(?,?,?,?,6096D655,?,?,?,?,?,6096CF88), ref: 6096D520
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.3291985708.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.3291948296.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292167442.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292194428.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292236704.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292280532.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.3292323305.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_60900000_envideojoiner2.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CriticalSection$EnterErrorLastLeaveValue
                                                                                                        • String ID:
                                                                                                        • API String ID: 682475483-0
                                                                                                        • Opcode ID: 79e4c3a08b5363d98cc33068bb7bbdcd271105d9d9d9c252471cf05fac27a945
                                                                                                        • Instruction ID: 6dd43474153c21470d2d90641e64b96ed0da30414b2d41baa8b5e8831fa3fcb2
                                                                                                        • Opcode Fuzzy Hash: 79e4c3a08b5363d98cc33068bb7bbdcd271105d9d9d9c252471cf05fac27a945
                                                                                                        • Instruction Fuzzy Hash: 9AF0F972A163104BEB10AF659CC1A5A7BFDEFB1218F100048FC6197354E770DC40D6A2