Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
vwZcJ81cpN.exe

Overview

General Information

Sample name:vwZcJ81cpN.exe
renamed because original name is a hash value
Original sample name:8d647e31e2e4241606104564b0efa364.exe
Analysis ID:1579793
MD5:8d647e31e2e4241606104564b0efa364
SHA1:427e9cd7cfb80db43c21187117c927397f21e774
SHA256:08b3976cf68e5714f6bded88a0aea5820946e94bdab8f88bf9c2792d51d21169
Tags:exeuser-abuse_ch
Infos:

Detection

Socks5Systemz
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Socks5Systemz
AI detected suspicious sample
Contains functionality to infect the boot sector
Found API chain indicative of debugger detection
Machine Learning detection for dropped file
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • vwZcJ81cpN.exe (PID: 8180 cmdline: "C:\Users\user\Desktop\vwZcJ81cpN.exe" MD5: 8D647E31E2E4241606104564B0EFA364)
    • vwZcJ81cpN.tmp (PID: 1224 cmdline: "C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp" /SL5="$204A8,3102839,56832,C:\Users\user\Desktop\vwZcJ81cpN.exe" MD5: 397E7773A205B3947EEE196EA2F624B9)
      • megasoftdivxconverter.exe (PID: 7356 cmdline: "C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe" -i MD5: 8FB49FA4DAF45523188E06A18EB4B95A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-NJ87C.tmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      C:\ProgramData\DivXConverter\DivXConverter.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
        SourceRuleDescriptionAuthorStrings
        00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
          00000003.00000000.1301885529.0000000000401000.00000020.00000001.01000000.00000009.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
            00000003.00000002.2547188110.0000000002B8E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
              Process Memory Space: megasoftdivxconverter.exe PID: 7356JoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
                SourceRuleDescriptionAuthorStrings
                3.0.megasoftdivxconverter.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-23T09:14:14.152841+010020287653Unknown Traffic192.168.2.1049817188.119.66.185443TCP
                  2024-12-23T09:14:19.978748+010020287653Unknown Traffic192.168.2.1049834188.119.66.185443TCP
                  2024-12-23T09:14:22.422455+010020287653Unknown Traffic192.168.2.1049840188.119.66.185443TCP
                  2024-12-23T09:14:24.901414+010020287653Unknown Traffic192.168.2.1049847188.119.66.185443TCP
                  2024-12-23T09:14:27.366550+010020287653Unknown Traffic192.168.2.1049853188.119.66.185443TCP
                  2024-12-23T09:14:29.819485+010020287653Unknown Traffic192.168.2.1049860188.119.66.185443TCP
                  2024-12-23T09:14:32.126103+010020287653Unknown Traffic192.168.2.1049869188.119.66.185443TCP
                  2024-12-23T09:14:34.413881+010020287653Unknown Traffic192.168.2.1049875188.119.66.185443TCP
                  2024-12-23T09:14:36.765043+010020287653Unknown Traffic192.168.2.1049881188.119.66.185443TCP
                  2024-12-23T09:14:39.066018+010020287653Unknown Traffic192.168.2.1049887188.119.66.185443TCP
                  2024-12-23T09:14:41.320641+010020287653Unknown Traffic192.168.2.1049894188.119.66.185443TCP
                  2024-12-23T09:14:43.569269+010020287653Unknown Traffic192.168.2.1049900188.119.66.185443TCP
                  2024-12-23T09:14:46.106700+010020287653Unknown Traffic192.168.2.1049906188.119.66.185443TCP
                  2024-12-23T09:14:48.579819+010020287653Unknown Traffic192.168.2.1049912188.119.66.185443TCP
                  2024-12-23T09:14:51.042560+010020287653Unknown Traffic192.168.2.1049918188.119.66.185443TCP
                  2024-12-23T09:14:53.500653+010020287653Unknown Traffic192.168.2.1049925188.119.66.185443TCP
                  2024-12-23T09:14:55.767683+010020287653Unknown Traffic192.168.2.1049932188.119.66.185443TCP
                  2024-12-23T09:14:58.030325+010020287653Unknown Traffic192.168.2.1049940188.119.66.185443TCP
                  2024-12-23T09:15:00.576248+010020287653Unknown Traffic192.168.2.1049944188.119.66.185443TCP
                  2024-12-23T09:15:03.017493+010020287653Unknown Traffic192.168.2.1049952188.119.66.185443TCP
                  2024-12-23T09:15:05.270180+010020287653Unknown Traffic192.168.2.1049959188.119.66.185443TCP
                  2024-12-23T09:15:07.520587+010020287653Unknown Traffic192.168.2.1049965188.119.66.185443TCP
                  2024-12-23T09:15:09.959569+010020287653Unknown Traffic192.168.2.1049970188.119.66.185443TCP
                  2024-12-23T09:15:12.396552+010020287653Unknown Traffic192.168.2.1049976188.119.66.185443TCP
                  2024-12-23T09:15:14.837089+010020287653Unknown Traffic192.168.2.1049982188.119.66.185443TCP
                  2024-12-23T09:15:17.082675+010020287653Unknown Traffic192.168.2.1049988188.119.66.185443TCP
                  2024-12-23T09:15:19.668075+010020287653Unknown Traffic192.168.2.1049995188.119.66.185443TCP
                  2024-12-23T09:15:22.330766+010020287653Unknown Traffic192.168.2.1050001188.119.66.185443TCP
                  2024-12-23T09:15:24.794211+010020287653Unknown Traffic192.168.2.1050004188.119.66.185443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-23T09:14:14.961400+010028032742Potentially Bad Traffic192.168.2.1049817188.119.66.185443TCP
                  2024-12-23T09:14:20.694356+010028032742Potentially Bad Traffic192.168.2.1049834188.119.66.185443TCP
                  2024-12-23T09:14:23.216575+010028032742Potentially Bad Traffic192.168.2.1049840188.119.66.185443TCP
                  2024-12-23T09:14:25.604252+010028032742Potentially Bad Traffic192.168.2.1049847188.119.66.185443TCP
                  2024-12-23T09:14:28.067338+010028032742Potentially Bad Traffic192.168.2.1049853188.119.66.185443TCP
                  2024-12-23T09:14:30.504088+010028032742Potentially Bad Traffic192.168.2.1049860188.119.66.185443TCP
                  2024-12-23T09:14:32.846990+010028032742Potentially Bad Traffic192.168.2.1049869188.119.66.185443TCP
                  2024-12-23T09:14:35.101914+010028032742Potentially Bad Traffic192.168.2.1049875188.119.66.185443TCP
                  2024-12-23T09:14:37.450816+010028032742Potentially Bad Traffic192.168.2.1049881188.119.66.185443TCP
                  2024-12-23T09:14:39.751690+010028032742Potentially Bad Traffic192.168.2.1049887188.119.66.185443TCP
                  2024-12-23T09:14:42.004082+010028032742Potentially Bad Traffic192.168.2.1049894188.119.66.185443TCP
                  2024-12-23T09:14:44.253431+010028032742Potentially Bad Traffic192.168.2.1049900188.119.66.185443TCP
                  2024-12-23T09:14:46.798821+010028032742Potentially Bad Traffic192.168.2.1049906188.119.66.185443TCP
                  2024-12-23T09:14:49.283364+010028032742Potentially Bad Traffic192.168.2.1049912188.119.66.185443TCP
                  2024-12-23T09:14:51.723893+010028032742Potentially Bad Traffic192.168.2.1049918188.119.66.185443TCP
                  2024-12-23T09:14:54.185062+010028032742Potentially Bad Traffic192.168.2.1049925188.119.66.185443TCP
                  2024-12-23T09:14:56.451028+010028032742Potentially Bad Traffic192.168.2.1049932188.119.66.185443TCP
                  2024-12-23T09:14:58.817117+010028032742Potentially Bad Traffic192.168.2.1049940188.119.66.185443TCP
                  2024-12-23T09:15:01.260148+010028032742Potentially Bad Traffic192.168.2.1049944188.119.66.185443TCP
                  2024-12-23T09:15:03.699777+010028032742Potentially Bad Traffic192.168.2.1049952188.119.66.185443TCP
                  2024-12-23T09:15:05.952778+010028032742Potentially Bad Traffic192.168.2.1049959188.119.66.185443TCP
                  2024-12-23T09:15:08.209115+010028032742Potentially Bad Traffic192.168.2.1049965188.119.66.185443TCP
                  2024-12-23T09:15:10.643460+010028032742Potentially Bad Traffic192.168.2.1049970188.119.66.185443TCP
                  2024-12-23T09:15:13.075497+010028032742Potentially Bad Traffic192.168.2.1049976188.119.66.185443TCP
                  2024-12-23T09:15:15.523973+010028032742Potentially Bad Traffic192.168.2.1049982188.119.66.185443TCP
                  2024-12-23T09:15:17.761353+010028032742Potentially Bad Traffic192.168.2.1049988188.119.66.185443TCP
                  2024-12-23T09:15:20.351055+010028032742Potentially Bad Traffic192.168.2.1049995188.119.66.185443TCP
                  2024-12-23T09:15:23.017560+010028032742Potentially Bad Traffic192.168.2.1050001188.119.66.185443TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: C:\ProgramData\DivXConverter\DivXConverter.exeReversingLabs: Detection: 52%
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeReversingLabs: Detection: 52%
                  Source: vwZcJ81cpN.exeReversingLabs: Detection: 42%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeJoe Sandbox ML: detected
                  Source: C:\ProgramData\DivXConverter\DivXConverter.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0045D188 GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion,1_2_0045D188
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0045D254 ArcFourCrypt,1_2_0045D254
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0045D23C ArcFourCrypt,1_2_0045D23C
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_10001000 ISCryptGetVersion,1_2_10001000
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_10001130 ArcFourCrypt,1_2_10001130

                  Compliance

                  barindex
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeUnpacked PE file: 3.2.megasoftdivxconverter.exe.400000.0.unpack
                  Source: vwZcJ81cpN.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DivX Converter_is1Jump to behavior
                  Source: unknownHTTPS traffic detected: 188.119.66.185:443 -> 192.168.2.10:49817 version: TLS 1.2
                  Source: Binary string: msvcp71.pdbx# source: is-T7J0P.tmp.1.dr
                  Source: Binary string: msvcr71.pdb< source: is-R45M2.tmp.1.dr
                  Source: Binary string: msvcp71.pdb source: is-T7J0P.tmp.1.dr
                  Source: Binary string: MicrosoftWindowsGdiPlus-1.0.2600.1360-gdiplus.pdb source: is-I69HP.tmp.1.dr
                  Source: Binary string: msvcr71.pdb source: is-R45M2.tmp.1.dr
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00452A60 FindFirstFileA,GetLastError,1_2_00452A60
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00474F88 FindFirstFileA,FindNextFileA,FindClose,1_2_00474F88
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004980A4 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_004980A4
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00464158 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464158
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00462750 FindFirstFileA,FindNextFileA,FindClose,1_2_00462750
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00463CDC SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463CDC
                  Source: global trafficTCP traffic: 192.168.2.10:49824 -> 89.105.201.183:2024
                  Source: Joe Sandbox ViewIP Address: 188.119.66.185 188.119.66.185
                  Source: Joe Sandbox ViewIP Address: 89.105.201.183 89.105.201.183
                  Source: Joe Sandbox ViewJA3 fingerprint: 51c64c77e60f3980eea90869b68c58a8
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49840 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49860 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49881 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49869 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49847 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49894 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49906 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49853 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49912 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49875 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49925 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49834 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49932 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49887 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49959 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49944 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49976 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49965 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49988 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49900 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49982 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:50001 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:50004 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49995 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49970 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49940 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49918 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49952 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.10:49817 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49834 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49817 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49847 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49860 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49900 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49840 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49853 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49965 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49944 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49982 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49881 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49918 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49875 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49869 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49988 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49959 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49976 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49932 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:50001 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49912 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49940 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49894 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49952 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49970 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49995 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49887 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49925 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49906 -> 188.119.66.185:443
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b82a8dcd6c946851e30088813250aa158405633775b0e650f3ba1e9c95b1c92975ccf55bc592fe5a818ece02a1b7e2984c57cad7021dda3a2018d53585 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_02CBEA5C InternetReadFile,3_2_02CBEA5C
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b82a8dcd6c946851e30088813250aa158405633775b0e650f3ba1e9c95b1c92975ccf55bc592fe5a818ece02a1b7e2984c57cad7021dda3a2018d53585 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: vwZcJ81cpN.tmp, vwZcJ81cpN.tmp, 00000001.00000000.1291227805.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-TM4VP.tmp.1.dr, vwZcJ81cpN.tmp.0.drString found in binary or memory: http://www.innosetup.com/
                  Source: vwZcJ81cpN.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline
                  Source: vwZcJ81cpN.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
                  Source: vwZcJ81cpN.exe, 00000000.00000003.1290628910.0000000002390000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.exe, 00000000.00000003.1290796220.00000000020B8000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.tmp, vwZcJ81cpN.tmp, 00000001.00000000.1291227805.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-TM4VP.tmp.1.dr, vwZcJ81cpN.tmp.0.drString found in binary or memory: http://www.remobjects.com/ps
                  Source: vwZcJ81cpN.exe, 00000000.00000003.1290628910.0000000002390000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.exe, 00000000.00000003.1290796220.00000000020B8000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.tmp, 00000001.00000000.1291227805.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-TM4VP.tmp.1.dr, vwZcJ81cpN.tmp.0.drString found in binary or memory: http://www.remobjects.com/psU
                  Source: megasoftdivxconverter.exe, 00000003.00000002.2546120526.0000000000A04000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/
                  Source: megasoftdivxconverter.exe, 00000003.00000002.2546120526.0000000000A04000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/4
                  Source: megasoftdivxconverter.exe, 00000003.00000002.2546120526.0000000000A04000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/X4
                  Source: megasoftdivxconverter.exe, 00000003.00000002.2547844738.0000000003382000.00000004.00000020.00020000.00000000.sdmp, megasoftdivxconverter.exe, 00000003.00000003.2130769087.0000000003355000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/Z
                  Source: megasoftdivxconverter.exe, 00000003.00000002.2546120526.0000000000A18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b82a8dcd6c946851e3008881325
                  Source: megasoftdivxconverter.exe, 00000003.00000002.2546120526.00000000009E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4
                  Source: megasoftdivxconverter.exe, 00000003.00000002.2546120526.0000000000A04000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/en-GB
                  Source: megasoftdivxconverter.exe, 00000003.00000002.2546120526.0000000000A04000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/icies
                  Source: megasoftdivxconverter.exe, 00000003.00000002.2546120526.0000000000A04000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/priseCertificates
                  Source: vwZcJ81cpN.exe, 00000000.00000003.1290233283.0000000002390000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.exe, 00000000.00000002.2545990709.00000000020B1000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.exe, 00000000.00000003.1290303305.00000000020B1000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.tmp, 00000001.00000003.1292115621.0000000002208000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.tmp, 00000001.00000002.2545439852.0000000000689000.00000004.00000020.00020000.00000000.sdmp, vwZcJ81cpN.tmp, 00000001.00000003.1292027049.0000000003130000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.tmp, 00000001.00000002.2546134422.0000000002208000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.easycutstudio.com/support.html
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49940
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49970 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49982
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49860
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49932 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49875 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49894 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49912 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49906 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49881 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49932
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49976
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49900 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49853
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49925 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49894
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49970
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49988 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50004 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49925
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49847
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49869 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49965
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49887
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49840
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49995 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49881
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49840 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49834 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49918 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50001 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49940 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49982 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49918
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49860 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49959
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49847 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49912
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49834
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49887 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49875
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49952
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49995
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49952 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49944 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50001
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50004
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49853 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49959 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49906
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49869
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49900
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49944
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49988
                  Source: unknownHTTPS traffic detected: 188.119.66.185:443 -> 192.168.2.10:49817 version: TLS 1.2
                  Source: is-I69HP.tmp.1.drBinary or memory string: DirectDrawCreateExmemstr_0317e078-4
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0042F520 NtdllDefWindowProc_A,1_2_0042F520
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00423B84 NtdllDefWindowProc_A,1_2_00423B84
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004125D8 NtdllDefWindowProc_A,1_2_004125D8
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00478AC0 NtdllDefWindowProc_A,1_2_00478AC0
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00457594 PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,1_2_00457594
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0042E934: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,1_2_0042E934
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004555E4 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555E4
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_0040840C0_2_0040840C
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004706A81_2_004706A8
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004809F71_2_004809F7
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004352C81_2_004352C8
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004673A41_2_004673A4
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0043DD501_2_0043DD50
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0043035C1_2_0043035C
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004444C81_2_004444C8
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004345C41_2_004345C4
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00444A701_2_00444A70
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00486BD01_2_00486BD0
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00430EE81_2_00430EE8
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0045F0C41_2_0045F0C4
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004451681_2_00445168
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0045B1741_2_0045B174
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004694041_2_00469404
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004455741_2_00445574
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004519BC1_2_004519BC
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00487B301_2_00487B30
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0048DF541_2_0048DF54
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_004010003_2_00401000
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_004067B73_2_004067B7
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609660FA3_2_609660FA
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6092114F3_2_6092114F
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6091F2C93_2_6091F2C9
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6096923E3_2_6096923E
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6093323D3_2_6093323D
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6095C3143_2_6095C314
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609503123_2_60950312
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094D33B3_2_6094D33B
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6093B3683_2_6093B368
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6096748C3_2_6096748C
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6093F42E3_2_6093F42E
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609544703_2_60954470
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609615FA3_2_609615FA
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6096A5EE3_2_6096A5EE
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6096D6A43_2_6096D6A4
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609606A83_2_609606A8
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609326543_2_60932654
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609556653_2_60955665
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094B7DB3_2_6094B7DB
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6092F74D3_2_6092F74D
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609648073_2_60964807
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094E9BC3_2_6094E9BC
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609379293_2_60937929
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6093FAD63_2_6093FAD6
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6096DAE83_2_6096DAE8
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094DA3A3_2_6094DA3A
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60936B273_2_60936B27
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60954CF63_2_60954CF6
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60950C6B3_2_60950C6B
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60966DF13_2_60966DF1
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60963D353_2_60963D35
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60909E9C3_2_60909E9C
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60951E863_2_60951E86
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60912E0B3_2_60912E0B
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60954FF83_2_60954FF8
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_02C694B33_2_02C694B3
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_02C4BAED3_2_02C4BAED
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_02C52A703_2_02C52A70
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_02C4D31F3_2_02C4D31F
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_02C470B03_2_02C470B0
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_02C3E0793_2_02C3E079
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_02C5266D3_2_02C5266D
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_02C4BF053_2_02C4BF05
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_02C4873A3_2_02C4873A
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_02C4B5F93_2_02C4B5F9
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_02C50DA43_2_02C50DA4
                  Source: Joe Sandbox ViewDropped File: C:\ProgramData\DivXConverter\sqlite3.dll 16574F51785B0E2FC29C2C61477EB47BB39F714829999511DC8952B43AB17660
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: String function: 02C52A00 appears 134 times
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: String function: 02C47750 appears 32 times
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: String function: 00408C0C appears 45 times
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: String function: 00406AC4 appears 43 times
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: String function: 0040595C appears 117 times
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: String function: 00457F1C appears 69 times
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: String function: 00403400 appears 60 times
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: String function: 00445DD4 appears 45 times
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: String function: 00457D10 appears 90 times
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: String function: 004344DC appears 32 times
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: String function: 004078F4 appears 43 times
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: String function: 00403494 appears 80 times
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: String function: 00403684 appears 210 times
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: String function: 00453344 appears 94 times
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: String function: 004460A4 appears 59 times
                  Source: vwZcJ81cpN.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                  Source: vwZcJ81cpN.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                  Source: vwZcJ81cpN.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
                  Source: megasoftdivxconverter.exe.1.drStatic PE information: Resource name: RT_STRING type: DOS executable (COM, 0x8C-variant)
                  Source: is-TM4VP.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                  Source: is-TM4VP.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                  Source: is-TM4VP.tmp.1.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
                  Source: DivXConverter.exe.3.drStatic PE information: Resource name: RT_STRING type: DOS executable (COM, 0x8C-variant)
                  Source: sqlite3.dll.3.drStatic PE information: Number of sections : 19 > 10
                  Source: is-2Q55I.tmp.1.drStatic PE information: Number of sections : 19 > 10
                  Source: vwZcJ81cpN.exe, 00000000.00000003.1290628910.0000000002390000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs vwZcJ81cpN.exe
                  Source: vwZcJ81cpN.exe, 00000000.00000003.1290796220.00000000020B8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs vwZcJ81cpN.exe
                  Source: vwZcJ81cpN.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                  Source: classification engineClassification label: mal96.troj.evad.winEXE@5/26@0/2
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_02C3F8C0 _memset,FormatMessageA,GetLastError,FormatMessageA,GetLastError,3_2_02C3F8C0
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004555E4 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555E4
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00455E0C GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,1_2_00455E0C
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: CreateServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,3_2_00401E0D
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0046E0E4 GetVersion,CoCreateInstance,1_2_0046E0E4
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_00409C34 FindResourceA,SizeofResource,LoadResource,LockResource,0_2_00409C34
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_0040195C StartServiceCtrlDispatcherA,3_2_0040195C
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_0040195C StartServiceCtrlDispatcherA,3_2_0040195C
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeFile created: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmpJump to behavior
                  Source: Yara matchFile source: 3.0.megasoftdivxconverter.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000000.1301885529.0000000000401000.00000020.00000001.01000000.00000009.sdmp, type: MEMORY
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe, type: DROPPED
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-NJ87C.tmp, type: DROPPED
                  Source: Yara matchFile source: C:\ProgramData\DivXConverter\DivXConverter.exe, type: DROPPED
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpFile read: C:\Windows\win.iniJump to behavior
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
                  Source: megasoftdivxconverter.exe, megasoftdivxconverter.exe, 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.3.dr, is-2Q55I.tmp.1.drBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                  Source: megasoftdivxconverter.exe, 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.3.dr, is-2Q55I.tmp.1.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                  Source: megasoftdivxconverter.exe, megasoftdivxconverter.exe, 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.3.dr, is-2Q55I.tmp.1.drBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
                  Source: megasoftdivxconverter.exe, 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.3.dr, is-2Q55I.tmp.1.drBinary or memory string: CREATE TABLE "%w"."%w_node"(nodeno INTEGER PRIMARY KEY, data BLOB);CREATE TABLE "%w"."%w_rowid"(rowid INTEGER PRIMARY KEY, nodeno INTEGER);CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY, parentnode INTEGER);INSERT INTO '%q'.'%q_node' VALUES(1, zeroblob(%d))
                  Source: megasoftdivxconverter.exe, 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.3.dr, is-2Q55I.tmp.1.drBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
                  Source: megasoftdivxconverter.exe, 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.3.dr, is-2Q55I.tmp.1.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
                  Source: megasoftdivxconverter.exe, 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.3.dr, is-2Q55I.tmp.1.drBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
                  Source: megasoftdivxconverter.exe, 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.3.dr, is-2Q55I.tmp.1.drBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                  Source: megasoftdivxconverter.exe, 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.3.dr, is-2Q55I.tmp.1.drBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                  Source: megasoftdivxconverter.exe, 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.3.dr, is-2Q55I.tmp.1.drBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
                  Source: megasoftdivxconverter.exe, 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.3.dr, is-2Q55I.tmp.1.drBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                  Source: megasoftdivxconverter.exe, megasoftdivxconverter.exe, 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.3.dr, is-2Q55I.tmp.1.drBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                  Source: vwZcJ81cpN.exeReversingLabs: Detection: 42%
                  Source: vwZcJ81cpN.exeString found in binary or memory: need to be updated. /RESTARTAPPLICATIONS Instructs Setup to restart applications. /NORESTARTAPPLICATIONS Prevents Setup from restarting applications. /LOADINF="filename" Instructs Setup to load the settings from the specified file after having checked t
                  Source: vwZcJ81cpN.exeString found in binary or memory: /LOADINF="filename"
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeFile read: C:\Users\user\Desktop\vwZcJ81cpN.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\vwZcJ81cpN.exe "C:\Users\user\Desktop\vwZcJ81cpN.exe"
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeProcess created: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp "C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp" /SL5="$204A8,3102839,56832,C:\Users\user\Desktop\vwZcJ81cpN.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpProcess created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe "C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe" -i
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeProcess created: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp "C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp" /SL5="$204A8,3102839,56832,C:\Users\user\Desktop\vwZcJ81cpN.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpProcess created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe "C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe" -iJump to behavior
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: shfolder.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: rstrtmgr.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: msacm32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: winmmbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: winmmbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: riched20.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: usp10.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: msls31.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: explorerframe.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: sfc.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: sqlite3.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpWindow found: window name: TMainFormJump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DivX Converter_is1Jump to behavior
                  Source: vwZcJ81cpN.exeStatic file information: File size 3351818 > 1048576
                  Source: Binary string: msvcp71.pdbx# source: is-T7J0P.tmp.1.dr
                  Source: Binary string: msvcr71.pdb< source: is-R45M2.tmp.1.dr
                  Source: Binary string: msvcp71.pdb source: is-T7J0P.tmp.1.dr
                  Source: Binary string: MicrosoftWindowsGdiPlus-1.0.2600.1360-gdiplus.pdb source: is-I69HP.tmp.1.dr
                  Source: Binary string: msvcr71.pdb source: is-R45M2.tmp.1.dr

                  Data Obfuscation

                  barindex
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeUnpacked PE file: 3.2.megasoftdivxconverter.exe.400000.0.unpack .amtt2:ER;.antt2:R;.aott2:W;.rsrc:R;.aptt2:EW; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeUnpacked PE file: 3.2.megasoftdivxconverter.exe.400000.0.unpack
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004502C0 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_004502C0
                  Source: initial sampleStatic PE information: section where entry point is pointing to: .amtt2
                  Source: megasoftdivxconverter.exe.1.drStatic PE information: section name: .amtt2
                  Source: megasoftdivxconverter.exe.1.drStatic PE information: section name: .antt2
                  Source: megasoftdivxconverter.exe.1.drStatic PE information: section name: .aott2
                  Source: megasoftdivxconverter.exe.1.drStatic PE information: section name: .aptt2
                  Source: is-I69HP.tmp.1.drStatic PE information: section name: Shared
                  Source: is-2Q55I.tmp.1.drStatic PE information: section name: /4
                  Source: is-2Q55I.tmp.1.drStatic PE information: section name: /19
                  Source: is-2Q55I.tmp.1.drStatic PE information: section name: /35
                  Source: is-2Q55I.tmp.1.drStatic PE information: section name: /51
                  Source: is-2Q55I.tmp.1.drStatic PE information: section name: /63
                  Source: is-2Q55I.tmp.1.drStatic PE information: section name: /77
                  Source: is-2Q55I.tmp.1.drStatic PE information: section name: /89
                  Source: is-2Q55I.tmp.1.drStatic PE information: section name: /102
                  Source: is-2Q55I.tmp.1.drStatic PE information: section name: /113
                  Source: is-2Q55I.tmp.1.drStatic PE information: section name: /124
                  Source: DivXConverter.exe.3.drStatic PE information: section name: .amtt2
                  Source: DivXConverter.exe.3.drStatic PE information: section name: .antt2
                  Source: DivXConverter.exe.3.drStatic PE information: section name: .aott2
                  Source: DivXConverter.exe.3.drStatic PE information: section name: .aptt2
                  Source: sqlite3.dll.3.drStatic PE information: section name: /4
                  Source: sqlite3.dll.3.drStatic PE information: section name: /19
                  Source: sqlite3.dll.3.drStatic PE information: section name: /35
                  Source: sqlite3.dll.3.drStatic PE information: section name: /51
                  Source: sqlite3.dll.3.drStatic PE information: section name: /63
                  Source: sqlite3.dll.3.drStatic PE information: section name: /77
                  Source: sqlite3.dll.3.drStatic PE information: section name: /89
                  Source: sqlite3.dll.3.drStatic PE information: section name: /102
                  Source: sqlite3.dll.3.drStatic PE information: section name: /113
                  Source: sqlite3.dll.3.drStatic PE information: section name: /124
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_004065C8 push 00406605h; ret 0_2_004065FD
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_00408104 push ecx; mov dword ptr [esp], eax0_2_00408109
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_0040C218 push eax; ret 0_2_0040C219
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_00408F38 push 00408F6Bh; ret 0_2_00408F63
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0040994C push 00409989h; ret 1_2_00409981
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00483F88 push 00484096h; ret 1_2_0048408E
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004062B4 push ecx; mov dword ptr [esp], eax1_2_004062B5
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004104E0 push ecx; mov dword ptr [esp], edx1_2_004104E5
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00412928 push 0041298Bh; ret 1_2_00412983
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00494CAC push ecx; mov dword ptr [esp], ecx1_2_00494CB1
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0040CE38 push ecx; mov dword ptr [esp], edx1_2_0040CE3A
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004592D0 push 00459314h; ret 1_2_0045930C
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0040F398 push ecx; mov dword ptr [esp], edx1_2_0040F39A
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00443440 push ecx; mov dword ptr [esp], ecx1_2_00443444
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0040546D push eax; ret 1_2_004054A9
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0040553D push 00405749h; ret 1_2_00405741
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004055BE push 00405749h; ret 1_2_00405741
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00485678 push ecx; mov dword ptr [esp], ecx1_2_0048567D
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0040563B push 00405749h; ret 1_2_00405741
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004056A0 push 00405749h; ret 1_2_00405741
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004517F8 push 0045182Bh; ret 1_2_00451823
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004519BC push ecx; mov dword ptr [esp], eax1_2_004519C1
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00477B08 push ecx; mov dword ptr [esp], edx1_2_00477B09
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00419C28 push ecx; mov dword ptr [esp], ecx1_2_00419C2D
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0045FD1C push ecx; mov dword ptr [esp], ecx1_2_0045FD20
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00409E4F push ds; ret 1_2_00409E50
                  Source: megasoftdivxconverter.exe.1.drStatic PE information: section name: .amtt2 entropy: 7.75224936493948
                  Source: DivXConverter.exe.3.drStatic PE information: section name: .amtt2 entropy: 7.75224936493948

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive03_2_02C3E8A2
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F866K.tmp\_isetup\_shfoldr.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-I69HP.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\gdiplus.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\sqlite3.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\msvcp71.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-PA5IH.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeFile created: C:\ProgramData\DivXConverter\DivXConverter.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-2Q55I.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\msvcr71.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F866K.tmp\_isetup\_iscrypt.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\uninstall\is-TM4VP.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-R45M2.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\uninstall\unins000.exe (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeFile created: C:\ProgramData\DivXConverter\sqlite3.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-T7J0P.tmpJump to dropped file
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeFile created: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F866K.tmp\_isetup\_setup64.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeFile created: C:\ProgramData\DivXConverter\DivXConverter.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeFile created: C:\ProgramData\DivXConverter\sqlite3.dllJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive03_2_02C3E8A2
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_0040195C StartServiceCtrlDispatcherA,3_2_0040195C
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00423C0C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C0C
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00423C0C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C0C
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004241DC IsIconic,SetActiveWindow,SetFocus,1_2_004241DC
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00424194 IsIconic,SetActiveWindow,1_2_00424194
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00418384 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,1_2_00418384
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0042285C SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,1_2_0042285C
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00417598 IsIconic,GetCapture,1_2_00417598
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0048393C IsIconic,GetWindowLongA,ShowWindow,ShowWindow,1_2_0048393C
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00417CCE IsIconic,SetWindowPos,1_2_00417CCE
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00417CD0 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,1_2_00417CD0
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0041F118 GetVersion,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_0041F118
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,3_2_02C3E9A6
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeWindow / User API: threadDelayed 9782Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-I69HP.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F866K.tmp\_isetup\_shfoldr.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\gdiplus.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\msvcp71.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-PA5IH.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-2Q55I.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\msvcr71.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F866K.tmp\_isetup\_iscrypt.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\uninstall\is-TM4VP.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\uninstall\unins000.exe (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-R45M2.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-T7J0P.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F866K.tmp\_isetup\_setup64.tmpJump to dropped file
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-5981
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_3-62037
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeAPI coverage: 4.8 %
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe TID: 7376Thread sleep count: 147 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe TID: 7376Thread sleep time: -294000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe TID: 8172Thread sleep time: -1260000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe TID: 7376Thread sleep count: 9782 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe TID: 7376Thread sleep time: -19564000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeFile opened: PhysicalDrive0Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00452A60 FindFirstFileA,GetLastError,1_2_00452A60
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00474F88 FindFirstFileA,FindNextFileA,FindClose,1_2_00474F88
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004980A4 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_004980A4
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00464158 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464158
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00462750 FindFirstFileA,FindNextFileA,FindClose,1_2_00462750
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00463CDC SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463CDC
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_00409B78 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_00409B78
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeThread delayed: delay time: 60000Jump to behavior
                  Source: megasoftdivxconverter.exe, 00000003.00000002.2546120526.0000000000928000.00000004.00000020.00020000.00000000.sdmp, megasoftdivxconverter.exe, 00000003.00000002.2547844738.0000000003342000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeAPI call chain: ExitProcess graph end nodegraph_0-6778
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeAPI call chain: ExitProcess graph end nodegraph_3-61684
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpProcess information queried: ProcessInformationJump to behavior

                  Anti Debugging

                  barindex
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_3-61933
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_02C480F0 IsDebuggerPresent,3_2_02C480F0
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_02C4E6AE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,3_2_02C4E6AE
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004502C0 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_004502C0
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_02C35E59 RtlInitializeCriticalSection,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_memset,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,_memset,_memset,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,_memset,_memset,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,3_2_02C35E59
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_02C480DA SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_02C480DA
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00478504 ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,1_2_00478504
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0042E09C AllocateAndInitializeSid,GetVersion,GetModuleHandleA,GetProcAddress,CheckTokenMembership,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,GetTokenInformation,EqualSid,CloseHandle,FreeSid,1_2_0042E09C
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_02C3E85A cpuid 3_2_02C3E85A
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: GetLocaleInfoA,0_2_0040520C
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: GetLocaleInfoA,0_2_00405258
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: GetLocaleInfoA,1_2_00408568
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: GetLocaleInfoA,1_2_004085B4
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004585C8 GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,1_2_004585C8
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
                  Source: C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0045559C GetUserNameA,1_2_0045559C
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_00405CF4 GetVersionExA,0_2_00405CF4

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.2547188110.0000000002B8E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: megasoftdivxconverter.exe PID: 7356, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.2547188110.0000000002B8E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: megasoftdivxconverter.exe PID: 7356, type: MEMORYSTR
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609660FA sqlite3_finalize,sqlite3_free,sqlite3_value_numeric_type,sqlite3_value_numeric_type,sqlite3_value_text,sqlite3_value_int,memcmp,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_strnicmp,sqlite3_mprintf,sqlite3_mprintf,sqlite3_malloc,sqlite3_free,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_bind_value,3_2_609660FA
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6090C1D6 sqlite3_clear_bindings,sqlite3_mutex_enter,sqlite3_mutex_leave,3_2_6090C1D6
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60963143 sqlite3_stricmp,sqlite3_bind_int64,sqlite3_mutex_leave,3_2_60963143
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6096A2BD sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,3_2_6096A2BD
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6096923E sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_malloc,sqlite3_malloc,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_realloc,sqlite3_realloc,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_free,3_2_6096923E
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6096A38C sqlite3_bind_int,sqlite3_column_int,sqlite3_step,sqlite3_reset,3_2_6096A38C
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6096748C sqlite3_malloc,sqlite3_bind_int,sqlite3_step,sqlite3_column_blob,sqlite3_column_bytes,sqlite3_reset,sqlite3_bind_int,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_malloc,sqlite3_bind_int64,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_reset,memcmp,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_bind_int64,sqlite3_realloc,sqlite3_column_int,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_bind_int,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,3_2_6096748C
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609254B1 sqlite3_bind_zeroblob,sqlite3_mutex_leave,3_2_609254B1
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094B407 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,3_2_6094B407
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6090F435 sqlite3_bind_parameter_index,3_2_6090F435
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609255D4 sqlite3_mutex_leave,sqlite3_bind_text16,3_2_609255D4
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609255FF sqlite3_bind_text,3_2_609255FF
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6096A5EE sqlite3_value_text,sqlite3_value_bytes,sqlite3_strnicmp,sqlite3_strnicmp,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_malloc,sqlite3_column_int,sqlite3_column_int64,sqlite3_column_text,sqlite3_column_bytes,sqlite3_finalize,sqlite3_step,sqlite3_free,sqlite3_finalize,sqlite3_strnicmp,sqlite3_bind_int,sqlite3_column_int,sqlite3_step,sqlite3_reset,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_column_int64,sqlite3_column_int,sqlite3_column_text,sqlite3_column_bytes,sqlite3_step,sqlite3_finalize,sqlite3_strnicmp,sqlite3_strnicmp,sqlite3_bind_int,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_value_int,sqlite3_malloc,sqlite3_bind_null,sqlite3_step,sqlite3_reset,sqlite3_value_int,sqlite3_value_text,sqlite3_value_bytes,sqlite3_free,3_2_6096A5EE
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094B54C sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,memmove,3_2_6094B54C
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60925686 sqlite3_bind_int64,sqlite3_mutex_leave,3_2_60925686
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094A6C5 sqlite3_bind_int64,sqlite3_step,sqlite3_column_blob,sqlite3_column_bytes,sqlite3_malloc,sqlite3_reset,sqlite3_free,3_2_6094A6C5
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609256E5 sqlite3_bind_int,sqlite3_bind_int64,3_2_609256E5
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094B6ED sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,3_2_6094B6ED
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6092562A sqlite3_bind_blob,3_2_6092562A
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60925655 sqlite3_bind_null,sqlite3_mutex_leave,3_2_60925655
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094C64A sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_free,3_2_6094C64A
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609687A7 sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_column_blob,sqlite3_column_bytes,sqlite3_column_int64,sqlite3_reset,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,3_2_609687A7
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6095F7F7 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,3_2_6095F7F7
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6092570B sqlite3_bind_double,sqlite3_mutex_leave,3_2_6092570B
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6095F772 sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,3_2_6095F772
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60925778 sqlite3_bind_value,sqlite3_bind_int64,sqlite3_bind_double,sqlite3_bind_blob,3_2_60925778
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6090577D sqlite3_bind_parameter_name,3_2_6090577D
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094B764 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,3_2_6094B764
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6090576B sqlite3_bind_parameter_count,3_2_6090576B
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094A894 sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,3_2_6094A894
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6095F883 sqlite3_bind_int64,sqlite3_bind_int,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,3_2_6095F883
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094C8C2 sqlite3_value_int,sqlite3_value_int,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_null,sqlite3_bind_null,sqlite3_step,sqlite3_reset,3_2_6094C8C2
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6096281E sqlite3_mprintf,sqlite3_vtab_config,sqlite3_malloc,sqlite3_mprintf,sqlite3_mprintf,sqlite3_errmsg,sqlite3_mprintf,sqlite3_free,sqlite3_mprintf,sqlite3_exec,sqlite3_free,sqlite3_prepare_v2,sqlite3_bind_text,sqlite3_step,sqlite3_column_int64,sqlite3_finalize,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_errmsg,sqlite3_mprintf,sqlite3_mprintf,sqlite3_mprintf,sqlite3_free,sqlite3_mprintf,sqlite3_free,sqlite3_declare_vtab,sqlite3_errmsg,sqlite3_mprintf,sqlite3_free,3_2_6096281E
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6096583A memcmp,sqlite3_realloc,qsort,sqlite3_malloc,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_step,sqlite3_reset,3_2_6096583A
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6095F9AD sqlite3_bind_int,sqlite3_step,sqlite3_column_type,sqlite3_reset,3_2_6095F9AD
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094A92B sqlite3_bind_int64,sqlite3_bind_null,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,3_2_6094A92B
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6090EAE5 sqlite3_transfer_bindings,3_2_6090EAE5
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6095FB98 sqlite3_value_int,sqlite3_bind_int,sqlite3_bind_value,sqlite3_step,sqlite3_reset,3_2_6095FB98
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6095ECA6 sqlite3_mprintf,sqlite3_mprintf,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_bind_value,3_2_6095ECA6
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6095FCCE sqlite3_malloc,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,3_2_6095FCCE
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6095FDAE sqlite3_malloc,sqlite3_bind_int,sqlite3_step,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_bind_int,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,sqlite3_free,3_2_6095FDAE
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60966DF1 sqlite3_value_text,sqlite3_mprintf,sqlite3_free,strcmp,sqlite3_free,sqlite3_malloc,sqlite3_bind_int64,sqlite3_step,sqlite3_column_type,sqlite3_reset,sqlite3_column_blob,sqlite3_reset,sqlite3_malloc,sqlite3_free,sqlite3_reset,sqlite3_result_error_code,sqlite3_result_blob,3_2_60966DF1
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60969D75 sqlite3_bind_int,sqlite3_step,sqlite3_column_int,sqlite3_reset,3_2_60969D75
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6095FFB2 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_result_error_code,3_2_6095FFB2
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
                  Native API
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  1
                  Deobfuscate/Decode Files or Information
                  1
                  Input Capture
                  1
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts2
                  Command and Scripting Interpreter
                  5
                  Windows Service
                  1
                  DLL Side-Loading
                  3
                  Obfuscated Files or Information
                  LSASS Memory1
                  Account Discovery
                  Remote Desktop Protocol1
                  Input Capture
                  21
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts2
                  Service Execution
                  1
                  Bootkit
                  1
                  Access Token Manipulation
                  21
                  Software Packing
                  Security Account Manager2
                  File and Directory Discovery
                  SMB/Windows Admin SharesData from Network Shared Drive1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook5
                  Windows Service
                  1
                  DLL Side-Loading
                  NTDS35
                  System Information Discovery
                  Distributed Component Object ModelInput Capture1
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
                  Process Injection
                  1
                  Masquerading
                  LSA Secrets241
                  Security Software Discovery
                  SSHKeylogging12
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts121
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials1
                  Process Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Access Token Manipulation
                  DCSync121
                  Virtualization/Sandbox Evasion
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
                  Process Injection
                  Proc Filesystem11
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                  Bootkit
                  /etc/passwd and /etc/shadow3
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Network Configuration Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  vwZcJ81cpN.exe42%ReversingLabsWin32.Trojan.Sockssystemz
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe100%Joe Sandbox ML
                  C:\ProgramData\DivXConverter\DivXConverter.exe100%Joe Sandbox ML
                  C:\ProgramData\DivXConverter\DivXConverter.exe52%ReversingLabsWin32.Trojan.Generic
                  C:\ProgramData\DivXConverter\sqlite3.dll0%ReversingLabs
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\gdiplus.dll (copy)0%ReversingLabs
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-2Q55I.tmp0%ReversingLabs
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-I69HP.tmp0%ReversingLabs
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-PA5IH.tmp0%ReversingLabs
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-R45M2.tmp0%ReversingLabs
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-T7J0P.tmp0%ReversingLabs
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.dll (copy)0%ReversingLabs
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe52%ReversingLabsWin32.Trojan.Generic
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\msvcp71.dll (copy)0%ReversingLabs
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\msvcr71.dll (copy)0%ReversingLabs
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\sqlite3.dll (copy)0%ReversingLabs
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\uninstall\is-TM4VP.tmp4%ReversingLabs
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\uninstall\unins000.exe (copy)4%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\is-F866K.tmp\_isetup\_iscrypt.dll0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\is-F866K.tmp\_isetup\_setup64.tmp0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\is-F866K.tmp\_isetup\_shfoldr.dll0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp4%ReversingLabs
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  No contacted domains info
                  NameMaliciousAntivirus DetectionReputation
                  https://188.119.66.185/ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b82a8dcd6c946851e30088813250aa158405633775b0e650f3ba1e9c95b1c92975ccf55bc592fe5a818ece02a1b7e2984c57cad7021dda3a2018d53585false
                    unknown
                    https://188.119.66.185/ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154false
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.innosetup.com/vwZcJ81cpN.tmp, vwZcJ81cpN.tmp, 00000001.00000000.1291227805.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-TM4VP.tmp.1.dr, vwZcJ81cpN.tmp.0.drfalse
                        high
                        https://188.119.66.185/4megasoftdivxconverter.exe, 00000003.00000002.2546120526.0000000000A04000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          https://188.119.66.185/ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4megasoftdivxconverter.exe, 00000003.00000002.2546120526.00000000009E2000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://www.remobjects.com/psUvwZcJ81cpN.exe, 00000000.00000003.1290628910.0000000002390000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.exe, 00000000.00000003.1290796220.00000000020B8000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.tmp, 00000001.00000000.1291227805.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-TM4VP.tmp.1.dr, vwZcJ81cpN.tmp.0.drfalse
                              high
                              https://188.119.66.185/ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b82a8dcd6c946851e3008881325megasoftdivxconverter.exe, 00000003.00000002.2546120526.0000000000A18000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                https://188.119.66.185/priseCertificatesmegasoftdivxconverter.exe, 00000003.00000002.2546120526.0000000000A04000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUvwZcJ81cpN.exefalse
                                    high
                                    https://188.119.66.185/Zmegasoftdivxconverter.exe, 00000003.00000002.2547844738.0000000003382000.00000004.00000020.00020000.00000000.sdmp, megasoftdivxconverter.exe, 00000003.00000003.2130769087.0000000003355000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      https://188.119.66.185/megasoftdivxconverter.exe, 00000003.00000002.2546120526.0000000000A04000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://188.119.66.185/en-GBmegasoftdivxconverter.exe, 00000003.00000002.2546120526.0000000000A04000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlinevwZcJ81cpN.exefalse
                                            high
                                            http://www.remobjects.com/psvwZcJ81cpN.exe, 00000000.00000003.1290628910.0000000002390000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.exe, 00000000.00000003.1290796220.00000000020B8000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.tmp, vwZcJ81cpN.tmp, 00000001.00000000.1291227805.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-TM4VP.tmp.1.dr, vwZcJ81cpN.tmp.0.drfalse
                                              high
                                              https://www.easycutstudio.com/support.htmlvwZcJ81cpN.exe, 00000000.00000003.1290233283.0000000002390000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.exe, 00000000.00000002.2545990709.00000000020B1000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.exe, 00000000.00000003.1290303305.00000000020B1000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.tmp, 00000001.00000003.1292115621.0000000002208000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.tmp, 00000001.00000002.2545439852.0000000000689000.00000004.00000020.00020000.00000000.sdmp, vwZcJ81cpN.tmp, 00000001.00000003.1292027049.0000000003130000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.tmp, 00000001.00000002.2546134422.0000000002208000.00000004.00001000.00020000.00000000.sdmpfalse
                                                high
                                                https://188.119.66.185/X4megasoftdivxconverter.exe, 00000003.00000002.2546120526.0000000000A04000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  https://188.119.66.185/iciesmegasoftdivxconverter.exe, 00000003.00000002.2546120526.0000000000A04000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs
                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    188.119.66.185
                                                    unknownRussian Federation
                                                    209499FLYNETRUfalse
                                                    89.105.201.183
                                                    unknownNetherlands
                                                    24875NOVOSERVE-ASNLfalse
                                                    Joe Sandbox version:41.0.0 Charoite
                                                    Analysis ID:1579793
                                                    Start date and time:2024-12-23 09:12:20 +01:00
                                                    Joe Sandbox product:CloudBasic
                                                    Overall analysis duration:0h 6m 50s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                    Number of analysed new started processes analysed:9
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Sample name:vwZcJ81cpN.exe
                                                    renamed because original name is a hash value
                                                    Original Sample Name:8d647e31e2e4241606104564b0efa364.exe
                                                    Detection:MAL
                                                    Classification:mal96.troj.evad.winEXE@5/26@0/2
                                                    EGA Information:
                                                    • Successful, ratio: 100%
                                                    HCA Information:
                                                    • Successful, ratio: 92%
                                                    • Number of executed functions: 197
                                                    • Number of non-executed functions: 272
                                                    Cookbook Comments:
                                                    • Found application associated with file extension: .exe
                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                    • Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.245.163.56, 52.149.20.212
                                                    • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    • VT rate limit hit for: vwZcJ81cpN.exe
                                                    TimeTypeDescription
                                                    03:13:53API Interceptor452338x Sleep call for process: megasoftdivxconverter.exe modified
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    188.119.66.185r4xiHKy8aM.exeGet hashmaliciousSocks5SystemzBrowse
                                                      gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                                        gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                                          Hbq580QZAR.exeGet hashmaliciousSocks5SystemzBrowse
                                                            steel.exe.2.exeGet hashmaliciousSocks5SystemzBrowse
                                                              stories.exe.2.exeGet hashmaliciousSocks5SystemzBrowse
                                                                basx.exeGet hashmaliciousSocks5SystemzBrowse
                                                                  list.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    newwork.exe.1.exeGet hashmaliciousSocks5SystemzBrowse
                                                                      stail.exe.3.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        89.105.201.183OFjT8HmzFJ.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 404
                                                                        N6jsQ3XNNX.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 200
                                                                        cv viewer plugin 8.31.40.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 200
                                                                        No context
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        FLYNETRUr4xiHKy8aM.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 188.119.66.185
                                                                        gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 188.119.66.185
                                                                        gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 188.119.66.185
                                                                        https://drive.google.com/file/d/1zySfUjQ3GqIVAlBHIX3CXdgIcWIqrMkO/view?usp=sharing_eip&ts=67645d30Get hashmaliciousUnknownBrowse
                                                                        • 188.119.66.154
                                                                        https://drive.google.com/file/d/1zySfUjQ3GqIVAlBHIX3CXdgIcWIqrMkO/view?usp=sharing_eil&ts=67645d30Get hashmaliciousUnknownBrowse
                                                                        • 188.119.66.154
                                                                        Hbq580QZAR.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 188.119.66.185
                                                                        steel.exe.2.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 188.119.66.185
                                                                        stories.exe.2.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 188.119.66.185
                                                                        basx.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 188.119.66.185
                                                                        list.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 188.119.66.185
                                                                        NOVOSERVE-ASNLnewwork.exe.1.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 89.105.201.183
                                                                        Mg5bMQ2lWi.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                        • 89.105.201.183
                                                                        wG1fFAzGfH.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                        • 89.105.201.183
                                                                        getlab.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 89.105.201.183
                                                                        file.exeGet hashmaliciousNymaim, Socks5SystemzBrowse
                                                                        • 89.105.201.183
                                                                        i7j22nof2Q.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 89.105.201.183
                                                                        file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                                        • 89.105.201.183
                                                                        file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 89.105.201.183
                                                                        file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 89.105.201.183
                                                                        file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 89.105.201.183
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        51c64c77e60f3980eea90869b68c58a8r4xiHKy8aM.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 188.119.66.185
                                                                        gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 188.119.66.185
                                                                        gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 188.119.66.185
                                                                        WindowsUpdate.exeGet hashmaliciousUnknownBrowse
                                                                        • 188.119.66.185
                                                                        Hbq580QZAR.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 188.119.66.185
                                                                        steel.exe.2.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 188.119.66.185
                                                                        stories.exe.2.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 188.119.66.185
                                                                        basx.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 188.119.66.185
                                                                        list.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 188.119.66.185
                                                                        newwork.exe.1.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        • 188.119.66.185
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        C:\ProgramData\DivXConverter\sqlite3.dllr4xiHKy8aM.exeGet hashmaliciousSocks5SystemzBrowse
                                                                          gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                                                            gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                                                              Hbq580QZAR.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                steel.exe.2.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  stories.exe.2.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                    basx.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                      list.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                        newwork.exe.1.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                          stail.exe.3.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                            Process:C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):3148960
                                                                                            Entropy (8bit):6.439028457562172
                                                                                            Encrypted:false
                                                                                            SSDEEP:49152:GDawBQUB1RgTLnZXjyZjyPH5zyqXSiZktry5LaNPA4Zy04:kasWnZXjSyPH5zyqXSmk5OLaJZV4
                                                                                            MD5:8FB49FA4DAF45523188E06A18EB4B95A
                                                                                            SHA1:D16A13952BB95E7D78BC72B40B833B889C365774
                                                                                            SHA-256:BECE9D307723DA8E9148C4F8143FEA0CDCBDD58A7EC26BAD1F08701B564A9C23
                                                                                            SHA-512:C598D3E2E60D0A6ACE343910F7C6A5959038CB288FA3BA159363054B6BB17167D9AC5F317609CC448AF24A347B3F371E0E55C448D8934801D1209FFC141ABAFA
                                                                                            Malicious:true
                                                                                            Yara Hits:
                                                                                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\ProgramData\DivXConverter\DivXConverter.exe, Author: Joe Security
                                                                                            Antivirus:
                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                            • Antivirus: ReversingLabs, Detection: 52%
                                                                                            Reputation:low
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L.....gg.............................V............@..........................p0.......0.....................................$........`..0\..............................................................................P............................amtt2..:........................... ..`.antt2..>4.......6..................@..@.aott2...e.......2..................@....rsrc....^...`...^..................@..@.aptt2...............f..............`.0.........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):645592
                                                                                            Entropy (8bit):6.50414583238337
                                                                                            Encrypted:false
                                                                                            SSDEEP:12288:i0zrcH2F3OfwjtWvuFEmhx0Cj37670jwX+E7tFKm0qTYh:iJUOfwh8u9hx0D70NE7tFTYh
                                                                                            MD5:E477A96C8F2B18D6B5C27BDE49C990BF
                                                                                            SHA1:E980C9BF41330D1E5BD04556DB4646A0210F7409
                                                                                            SHA-256:16574F51785B0E2FC29C2C61477EB47BB39F714829999511DC8952B43AB17660
                                                                                            SHA-512:335A86268E7C0E568B1C30981EC644E6CD332E66F96D2551B58A82515316693C1859D87B4F4B7310CF1AC386CEE671580FDD999C3BCB23ACF2C2282C01C8798C
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            Joe Sandbox View:
                                                                                            • Filename: r4xiHKy8aM.exe, Detection: malicious, Browse
                                                                                            • Filename: gjEtERlBSv.exe, Detection: malicious, Browse
                                                                                            • Filename: gjEtERlBSv.exe, Detection: malicious, Browse
                                                                                            • Filename: Hbq580QZAR.exe, Detection: malicious, Browse
                                                                                            • Filename: steel.exe.2.exe, Detection: malicious, Browse
                                                                                            • Filename: stories.exe.2.exe, Detection: malicious, Browse
                                                                                            • Filename: basx.exe, Detection: malicious, Browse
                                                                                            • Filename: list.exe, Detection: malicious, Browse
                                                                                            • Filename: newwork.exe.1.exe, Detection: malicious, Browse
                                                                                            • Filename: stail.exe.3.exe, Detection: malicious, Browse
                                                                                            Reputation:high, very likely benign file
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=S.v..?......!................X..............`......................... ......8......... .................................L................................'......................................................p............................text...............................`.0`.data...............................@.@..rdata..$...........................@.@@.bss..................................@..edata..............................@.0@.idata..L...........................@.0..CRT................................@.0..tls.... ...........................@.0..reloc...'.......(..................@.0B/4......`....0......................@.@B/19..........@......................@..B/35.....M....P......................@..B/51.....`C...`...D..................@..B/63..................8..............@..B/77..................F..............@..B/89..................R..
                                                                                            Process:C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            File Type:ISO-8859 text, with no line terminators, with escape sequences
                                                                                            Category:dropped
                                                                                            Size (bytes):8
                                                                                            Entropy (8bit):2.0
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:p/ll:pX
                                                                                            MD5:749C842DA93A29D06B0FC0372B5EE29D
                                                                                            SHA1:E5CC5A485086DA28E827BAF08F542034EEAE36ED
                                                                                            SHA-256:487F0BB06AE7A04702F35EEA41653C4F2CEACD09E8EC5ED180DE7E65E72A4A77
                                                                                            SHA-512:F643F4BBCD761E7EE0686BC38617B0090E7051851F6E0AED5C672F7E942A26F5CBADE8C2756273B990599739837A030749E72FC799268BBC4C1162A2FED04AF0
                                                                                            Malicious:false
                                                                                            Reputation:low
                                                                                            Preview:..ig....
                                                                                            Process:C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):4
                                                                                            Entropy (8bit):0.8112781244591328
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:Xln:1
                                                                                            MD5:ED69DFADEF68FC181AAE2D22715A01D6
                                                                                            SHA1:3A9981C3761721792B7702231583758AE5ACF8A7
                                                                                            SHA-256:3EF3BD3D6658C0DFDFDD7AA65E3D92BF1DA9A04678A4ED2A5D84ED824EC91775
                                                                                            SHA-512:B70AF13C96AC7C3AC97C84F9EFC1F38794B190635AB602CE35C8572B9C3597DD1A4ABBFFCCB3AD8AE76CDB247C221168F2D45B7225A56444FF445937921FC318
                                                                                            Malicious:false
                                                                                            Reputation:moderate, very likely benign file
                                                                                            Preview:....
                                                                                            Process:C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            File Type:ASCII text, with no line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):128
                                                                                            Entropy (8bit):2.9012093522336393
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:ObXXXd0AbDBdUBWetxt:Or9Lb3UFx
                                                                                            MD5:679DD163372163CD8FFC24E3C9E758B3
                                                                                            SHA1:F307C14CA65810C8D0238B89B49B2ACD7C5B233B
                                                                                            SHA-256:510EA89D00FA427C33BD67AEEA60D21066976F085959C2AFE1F69411A8CA722D
                                                                                            SHA-512:46C464F15BCE39E28DCD48AF36C424845631D2B48D7E37D7FBBBEE0BC4DF32445A2810E397BF29FCA76C0364B1AA30CC05DCF4D9E799C6C697B49A174560969C
                                                                                            Malicious:false
                                                                                            Reputation:moderate, very likely benign file
                                                                                            Preview:12b48997735ce8b4537cf99be74bb62f518d3799011c89eb7c719048e83fac56................................................................
                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):1645320
                                                                                            Entropy (8bit):6.787752063353702
                                                                                            Encrypted:false
                                                                                            SSDEEP:24576:Fk18V2mHkfIE3Ip9vkWEgDecZV3W9kpOuRw8RhWd5Ixwzr6lOboU7j97S9D+z98v:FZNkf+uW3D1ZVG9kVw8I5Rv6lwH9+X
                                                                                            MD5:871C903A90C45CA08A9D42803916C3F7
                                                                                            SHA1:D962A12BC15BFB4C505BB63F603CA211588958DB
                                                                                            SHA-256:F1DA32183B3DA19F75FA4EF0974A64895266B16D119BBB1DA9FE63867DBA0645
                                                                                            SHA-512:985B0B8B5E3D96ACFD0514676D9F0C5D2D8F11E31F01ACFA0F7DA9AF3568E12343CA77F541F55EDDA6A0E5C14FE733BDA5DC1C10BB170D40D15B7A60AD000145
                                                                                            Malicious:false
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......s...7o..7o..7o...L..<o..7o..en...L..$o...L...o...L..6o...L..6o...L..(n...L..6o..Rich7o..................PE..L.....D@...........!.........`.......Q.......`.....p................................................................l...CN..|...x....p...........................s.....8...............................................0............................text...n........................... ..`.data...X...........................@...Shared.......`.......P..............@....rsrc........p... ...`..............@..@.reloc...s..........................@..B................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):645592
                                                                                            Entropy (8bit):6.50414583238337
                                                                                            Encrypted:false
                                                                                            SSDEEP:12288:i0zrcH2F3OfwjtWvuFEmhx0Cj37670jwX+E7tFKm0qTYh:iJUOfwh8u9hx0D70NE7tFTYh
                                                                                            MD5:E477A96C8F2B18D6B5C27BDE49C990BF
                                                                                            SHA1:E980C9BF41330D1E5BD04556DB4646A0210F7409
                                                                                            SHA-256:16574F51785B0E2FC29C2C61477EB47BB39F714829999511DC8952B43AB17660
                                                                                            SHA-512:335A86268E7C0E568B1C30981EC644E6CD332E66F96D2551B58A82515316693C1859D87B4F4B7310CF1AC386CEE671580FDD999C3BCB23ACF2C2282C01C8798C
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=S.v..?......!................X..............`......................... ......8......... .................................L................................'......................................................p............................text...............................`.0`.data...............................@.@..rdata..$...........................@.@@.bss..................................@..edata..............................@.0@.idata..L...........................@.0..CRT................................@.0..tls.... ...........................@.0..reloc...'.......(..................@.0B/4......`....0......................@.@B/19..........@......................@..B/35.....M....P......................@..B/51.....`C...`...D..................@..B/63..................8..............@..B/77..................F..............@..B/89..................R..
                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp
                                                                                            File Type:MS Windows HtmlHelp Data
                                                                                            Category:dropped
                                                                                            Size (bytes):78183
                                                                                            Entropy (8bit):7.692742945771669
                                                                                            Encrypted:false
                                                                                            SSDEEP:1536:Bkt2SjEQ3r94YqwyadpL1X6Dtn4afF1VowWb8ZmmUQNk3gNqCLbMsFxJse8hbpmn:mR/CYj9dp5XIyI2b/mY3gNjLbMsOaP
                                                                                            MD5:B1B9E6D43319F6D4E52ED858C5726A97
                                                                                            SHA1:5033047A30CCCF57783C600FD76A6D220021B19D
                                                                                            SHA-256:8003A4A0F9F5DFB62BEFBF81F8C05894B0C1F987ACFC8654A6C6CE02B6213910
                                                                                            SHA-512:E56D6EC9170DEBAC28BB514942F794F73D4C194D04C54EFF9227B6EE3C74BA4FCF239FFF0BB6556DC8B847FA89D382AF206A2C481C41A3510936B0A74192D2C2
                                                                                            Malicious:false
                                                                                            Preview:ITSF....`..........E.......|.{.......".....|.{......."..`...............x.......T.......................g1..............ITSP....T...........................................j..].!......."..T...............PMGLW................/..../#IDXHDR...F.../#ITBITS..../#IVB...N$./#STRINGS.....P./#SYSTEM..N.'./#TOPICS...F.0./#URLSTR...:.t./#URLTBL...v.D./$FIftiMain......1./$OBJINST...z.../$WWAssociativeLinks/..../$WWAssociativeLinks/Property...v../$WWKeywordLinks/..../$WWKeywordLinks/Property...r../After.jpg...4..../Auto-.hhc...^./Auto-Adjustment.htm....?./Auto-BleachTeeth.htm...z.3./Auto-Crop2Plus.htm..U.j./Auto-Emphasis.htm...w.V./Auto-EyeColor.htm...!.../Auto-EyePencil.htm..._.../Auto-EyeShadow.htm...,.3./Auto-GettingStarted.htm....Q./Auto-Lipstick.htm..R.M./Auto-Liquify.htm...-.v./Auto-Menu.htm..S.r./Auto-OrderingInformation.htm...Q.../Auto-Overview.htm..^.$./Auto-Powder.htm......./Auto-Resize.htm..s.b./Auto-Rotation.htm..?.e./Auto-Rouge.htm...=.d./Auto-SkinCare.htm...|.{./Auto-SmartPatchCosmet
                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):1645320
                                                                                            Entropy (8bit):6.787752063353702
                                                                                            Encrypted:false
                                                                                            SSDEEP:24576:Fk18V2mHkfIE3Ip9vkWEgDecZV3W9kpOuRw8RhWd5Ixwzr6lOboU7j97S9D+z98v:FZNkf+uW3D1ZVG9kVw8I5Rv6lwH9+X
                                                                                            MD5:871C903A90C45CA08A9D42803916C3F7
                                                                                            SHA1:D962A12BC15BFB4C505BB63F603CA211588958DB
                                                                                            SHA-256:F1DA32183B3DA19F75FA4EF0974A64895266B16D119BBB1DA9FE63867DBA0645
                                                                                            SHA-512:985B0B8B5E3D96ACFD0514676D9F0C5D2D8F11E31F01ACFA0F7DA9AF3568E12343CA77F541F55EDDA6A0E5C14FE733BDA5DC1C10BB170D40D15B7A60AD000145
                                                                                            Malicious:false
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......s...7o..7o..7o...L..<o..7o..en...L..$o...L...o...L..6o...L..6o...L..(n...L..6o..Rich7o..................PE..L.....D@...........!.........`.......Q.......`.....p................................................................l...CN..|...x....p...........................s.....8...............................................0............................text...n........................... ..`.data...X...........................@...Shared.......`.......P..............@....rsrc........p... ...`..............@..@.reloc...s..........................@..B................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):3148960
                                                                                            Entropy (8bit):6.439028029427195
                                                                                            Encrypted:false
                                                                                            SSDEEP:49152:LDawBQUB1RgTLnZXjyZjyPH5zyqXSiZktry5LaNPA4Zy04:3asWnZXjSyPH5zyqXSmk5OLaJZV4
                                                                                            MD5:57F16FED97A4F26E62603C4B10FB4803
                                                                                            SHA1:55BA04C0643A2A0DB37A184BFF1B96D40F5E5899
                                                                                            SHA-256:F9EAA58F5F6C14232D6870A9E9338E91B72A5BD461838D7D5A800408F17968D5
                                                                                            SHA-512:B4592932F94AA2589C8B7A4841C0983880CB5E2A65628F1844247C3F407CA677BD9A43923B6291A500AF833EDCBEBC4DE03D6F6FCB93E5EBBEEFA2BB0F8918AD
                                                                                            Malicious:false
                                                                                            Yara Hits:
                                                                                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-NJ87C.tmp, Author: Joe Security
                                                                                            Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L.....gg.............................V............@..........................p0.......0.....................................$........`..0\..............................................................................P............................amtt2..:........................... ..`.antt2..>4.......6..................@..@.aott2...e.......2..................@....rsrc....^...`...^..................@..@.aptt2...............f..............`.0.........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):176128
                                                                                            Entropy (8bit):6.204917493416147
                                                                                            Encrypted:false
                                                                                            SSDEEP:3072:l9iEoC1+7N9UQV2Mi8NTUU3/EO3h3E9y6GeoPRtsoWhi75MUbvSHQ:l+ssU62Mi8x9P/UVGeQRthMUbvS
                                                                                            MD5:FEC4FF0C2967A05543747E8D552CF9DF
                                                                                            SHA1:B4449DC0DF8C0AFCC9F32776384A6F5B5CEDE20C
                                                                                            SHA-256:5374148EBCF4B456F8711516A58C9A007A393CA88F3D9759041F691E4343C7D6
                                                                                            SHA-512:93E3F48CD393314178CBC86F6142D577D5EAAE52B47C4D947DBA4DFB706860B150FF5B0E546CB83114CA44666E9DF6021964D79D064B775A58698DAA9550EF13
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+0.J^..J^..J^.cE...J^..VR..J^..UU..J^.#VP..J^..UT..J^..UZ..J^..kU..J^..kZ..J^..J_..J^..iT..J^..io..J^.gLX..J^._jZ..J^.Rich.J^.................PE..L.....L...........!.....0...@.......'.......@...................................................................... e..k....X..d....`.......................p..p....................................................@...............................text....".......0.................. ..`.rdata...%...@...0...@..............@..@.data...T....p... ...p..............@....rsrc........`......................@..@.reloc.......p......................@..B........................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):348160
                                                                                            Entropy (8bit):6.542655141037356
                                                                                            Encrypted:false
                                                                                            SSDEEP:6144:OcV9z83OtqxnEYmt3NEnvfF+Tbmbw6An8FMciFMNrb3YgxxpbCAOxO2ElvlE:Ooz83OtIEzW+/m/AyF7bCrO/E
                                                                                            MD5:86F1895AE8C5E8B17D99ECE768A70732
                                                                                            SHA1:D5502A1D00787D68F548DDEEBBDE1ECA5E2B38CA
                                                                                            SHA-256:8094AF5EE310714CAEBCCAEEE7769FFB08048503BA478B879EDFEF5F1A24FEFE
                                                                                            SHA-512:3B7CE2B67056B6E005472B73447D2226677A8CADAE70428873F7EFA5ED11A3B3DBF6B1A42C5B05B1F2B1D8E06FF50DFC6532F043AF8452ED87687EEFBF1791DA
                                                                                            Malicious:false
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2..S..S..S..Tp..S..S..5S..BX..S..BX...S..BX..Q..BX..S..BX..S..BX..S..Rich.S..........................PE..L.....V>...........!................."............4|.........................`......................................t....C......(.... .......................0..d+..H...8...........................x...H...............l............................text............................... ..`.rdata..@...........................@..@.data... h.......`..................@....rsrc........ ......................@..@.reloc..d+...0...0... ..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):499712
                                                                                            Entropy (8bit):6.414789978441117
                                                                                            Encrypted:false
                                                                                            SSDEEP:12288:fJzxYPVsBnxO/R7krZhUgiW6QR7t5k3Ooc8iHkC2eq:fZxvBnxOJ7ki3Ooc8iHkC2e
                                                                                            MD5:561FA2ABB31DFA8FAB762145F81667C2
                                                                                            SHA1:C8CCB04EEDAC821A13FAE314A2435192860C72B8
                                                                                            SHA-256:DF96156F6A548FD6FE5672918DE5AE4509D3C810A57BFFD2A91DE45A3ED5B23B
                                                                                            SHA-512:7D960AA8E3CCE22D63A6723D7F00C195DE7DE83B877ECA126E339E2D8CC9859E813E05C5C0A5671A75BB717243E9295FD13E5E17D8C6660EB59F5BAEE63A7C43
                                                                                            Malicious:false
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................................................................Rich...................PE..L.....w>...........!.................-............:|................................~e..............................$...?...d!..<....`.......................p...0..8...8...............................H............................................text............................... ..`.rdata..2*.......0..................@..@.data...h!...0... ...0..............@....rsrc........`.......P..............@..@.reloc...0...p...@...`..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp
                                                                                            File Type:MS Windows HtmlHelp Data
                                                                                            Category:dropped
                                                                                            Size (bytes):78183
                                                                                            Entropy (8bit):7.692742945771669
                                                                                            Encrypted:false
                                                                                            SSDEEP:1536:Bkt2SjEQ3r94YqwyadpL1X6Dtn4afF1VowWb8ZmmUQNk3gNqCLbMsFxJse8hbpmn:mR/CYj9dp5XIyI2b/mY3gNjLbMsOaP
                                                                                            MD5:B1B9E6D43319F6D4E52ED858C5726A97
                                                                                            SHA1:5033047A30CCCF57783C600FD76A6D220021B19D
                                                                                            SHA-256:8003A4A0F9F5DFB62BEFBF81F8C05894B0C1F987ACFC8654A6C6CE02B6213910
                                                                                            SHA-512:E56D6EC9170DEBAC28BB514942F794F73D4C194D04C54EFF9227B6EE3C74BA4FCF239FFF0BB6556DC8B847FA89D382AF206A2C481C41A3510936B0A74192D2C2
                                                                                            Malicious:false
                                                                                            Preview:ITSF....`..........E.......|.{.......".....|.{......."..`...............x.......T.......................g1..............ITSP....T...........................................j..].!......."..T...............PMGLW................/..../#IDXHDR...F.../#ITBITS..../#IVB...N$./#STRINGS.....P./#SYSTEM..N.'./#TOPICS...F.0./#URLSTR...:.t./#URLTBL...v.D./$FIftiMain......1./$OBJINST...z.../$WWAssociativeLinks/..../$WWAssociativeLinks/Property...v../$WWKeywordLinks/..../$WWKeywordLinks/Property...r../After.jpg...4..../Auto-.hhc...^./Auto-Adjustment.htm....?./Auto-BleachTeeth.htm...z.3./Auto-Crop2Plus.htm..U.j./Auto-Emphasis.htm...w.V./Auto-EyeColor.htm...!.../Auto-EyePencil.htm..._.../Auto-EyeShadow.htm...,.3./Auto-GettingStarted.htm....Q./Auto-Lipstick.htm..R.M./Auto-Liquify.htm...-.v./Auto-Menu.htm..S.r./Auto-OrderingInformation.htm...Q.../Auto-Overview.htm..^.$./Auto-Powder.htm......./Auto-Resize.htm..s.b./Auto-Rotation.htm..?.e./Auto-Rouge.htm...=.d./Auto-SkinCare.htm...|.{./Auto-SmartPatchCosmet
                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):176128
                                                                                            Entropy (8bit):6.204917493416147
                                                                                            Encrypted:false
                                                                                            SSDEEP:3072:l9iEoC1+7N9UQV2Mi8NTUU3/EO3h3E9y6GeoPRtsoWhi75MUbvSHQ:l+ssU62Mi8x9P/UVGeQRthMUbvS
                                                                                            MD5:FEC4FF0C2967A05543747E8D552CF9DF
                                                                                            SHA1:B4449DC0DF8C0AFCC9F32776384A6F5B5CEDE20C
                                                                                            SHA-256:5374148EBCF4B456F8711516A58C9A007A393CA88F3D9759041F691E4343C7D6
                                                                                            SHA-512:93E3F48CD393314178CBC86F6142D577D5EAAE52B47C4D947DBA4DFB706860B150FF5B0E546CB83114CA44666E9DF6021964D79D064B775A58698DAA9550EF13
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+0.J^..J^..J^.cE...J^..VR..J^..UU..J^.#VP..J^..UT..J^..UZ..J^..kU..J^..kZ..J^..J_..J^..iT..J^..io..J^.gLX..J^._jZ..J^.Rich.J^.................PE..L.....L...........!.....0...@.......'.......@...................................................................... e..k....X..d....`.......................p..p....................................................@...............................text....".......0.................. ..`.rdata...%...@...0...@..............@..@.data...T....p... ...p..............@....rsrc........`......................@..@.reloc.......p......................@..B........................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Category:modified
                                                                                            Size (bytes):3148960
                                                                                            Entropy (8bit):6.439028457562172
                                                                                            Encrypted:false
                                                                                            SSDEEP:49152:GDawBQUB1RgTLnZXjyZjyPH5zyqXSiZktry5LaNPA4Zy04:kasWnZXjSyPH5zyqXSmk5OLaJZV4
                                                                                            MD5:8FB49FA4DAF45523188E06A18EB4B95A
                                                                                            SHA1:D16A13952BB95E7D78BC72B40B833B889C365774
                                                                                            SHA-256:BECE9D307723DA8E9148C4F8143FEA0CDCBDD58A7EC26BAD1F08701B564A9C23
                                                                                            SHA-512:C598D3E2E60D0A6ACE343910F7C6A5959038CB288FA3BA159363054B6BB17167D9AC5F317609CC448AF24A347B3F371E0E55C448D8934801D1209FFC141ABAFA
                                                                                            Malicious:true
                                                                                            Yara Hits:
                                                                                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe, Author: Joe Security
                                                                                            Antivirus:
                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                            • Antivirus: ReversingLabs, Detection: 52%
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L.....gg.............................V............@..........................p0.......0.....................................$........`..0\..............................................................................P............................amtt2..:........................... ..`.antt2..>4.......6..................@..@.aott2...e.......2..................@....rsrc....^...`...^..................@..@.aptt2...............f..............`.0.........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):499712
                                                                                            Entropy (8bit):6.414789978441117
                                                                                            Encrypted:false
                                                                                            SSDEEP:12288:fJzxYPVsBnxO/R7krZhUgiW6QR7t5k3Ooc8iHkC2eq:fZxvBnxOJ7ki3Ooc8iHkC2e
                                                                                            MD5:561FA2ABB31DFA8FAB762145F81667C2
                                                                                            SHA1:C8CCB04EEDAC821A13FAE314A2435192860C72B8
                                                                                            SHA-256:DF96156F6A548FD6FE5672918DE5AE4509D3C810A57BFFD2A91DE45A3ED5B23B
                                                                                            SHA-512:7D960AA8E3CCE22D63A6723D7F00C195DE7DE83B877ECA126E339E2D8CC9859E813E05C5C0A5671A75BB717243E9295FD13E5E17D8C6660EB59F5BAEE63A7C43
                                                                                            Malicious:false
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................................................................Rich...................PE..L.....w>...........!.................-............:|................................~e..............................$...?...d!..<....`.......................p...0..8...8...............................H............................................text............................... ..`.rdata..2*.......0..................@..@.data...h!...0... ...0..............@....rsrc........`.......P..............@..@.reloc...0...p...@...`..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):348160
                                                                                            Entropy (8bit):6.542655141037356
                                                                                            Encrypted:false
                                                                                            SSDEEP:6144:OcV9z83OtqxnEYmt3NEnvfF+Tbmbw6An8FMciFMNrb3YgxxpbCAOxO2ElvlE:Ooz83OtIEzW+/m/AyF7bCrO/E
                                                                                            MD5:86F1895AE8C5E8B17D99ECE768A70732
                                                                                            SHA1:D5502A1D00787D68F548DDEEBBDE1ECA5E2B38CA
                                                                                            SHA-256:8094AF5EE310714CAEBCCAEEE7769FFB08048503BA478B879EDFEF5F1A24FEFE
                                                                                            SHA-512:3B7CE2B67056B6E005472B73447D2226677A8CADAE70428873F7EFA5ED11A3B3DBF6B1A42C5B05B1F2B1D8E06FF50DFC6532F043AF8452ED87687EEFBF1791DA
                                                                                            Malicious:false
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2..S..S..S..Tp..S..S..5S..BX..S..BX...S..BX..Q..BX..S..BX..S..BX..S..Rich.S..........................PE..L.....V>...........!................."............4|.........................`......................................t....C......(.... .......................0..d+..H...8...........................x...H...............l............................text............................... ..`.rdata..@...........................@..@.data... h.......`..................@....rsrc........ ......................@..@.reloc..d+...0...0... ..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):645592
                                                                                            Entropy (8bit):6.50414583238337
                                                                                            Encrypted:false
                                                                                            SSDEEP:12288:i0zrcH2F3OfwjtWvuFEmhx0Cj37670jwX+E7tFKm0qTYh:iJUOfwh8u9hx0D70NE7tFTYh
                                                                                            MD5:E477A96C8F2B18D6B5C27BDE49C990BF
                                                                                            SHA1:E980C9BF41330D1E5BD04556DB4646A0210F7409
                                                                                            SHA-256:16574F51785B0E2FC29C2C61477EB47BB39F714829999511DC8952B43AB17660
                                                                                            SHA-512:335A86268E7C0E568B1C30981EC644E6CD332E66F96D2551B58A82515316693C1859D87B4F4B7310CF1AC386CEE671580FDD999C3BCB23ACF2C2282C01C8798C
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=S.v..?......!................X..............`......................... ......8......... .................................L................................'......................................................p............................text...............................`.0`.data...............................@.@..rdata..$...........................@.@@.bss..................................@..edata..............................@.0@.idata..L...........................@.0..CRT................................@.0..tls.... ...........................@.0..reloc...'.......(..................@.0B/4......`....0......................@.@B/19..........@......................@..B/35.....M....P......................@..B/51.....`C...`...D..................@..B/63..................8..............@..B/77..................F..............@..B/89..................R..
                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):717985
                                                                                            Entropy (8bit):6.514923513596488
                                                                                            Encrypted:false
                                                                                            SSDEEP:12288:1TPcYn5c/rPx37/zHBA6a5UeYpthr1CERAgrNuR+QIq5MRxyFf:dPcYn5c/rPx37/zHBA6pFptZ1CE9qMRG
                                                                                            MD5:A9C5640ADBBCA1842CD24EFE386C64C8
                                                                                            SHA1:A8591890503649B6B335D6D633D5F0821CCA61C2
                                                                                            SHA-256:5981E4A067B02E2AE0864AA400966EECC8F5408DC65F1A06DF44C946139E9670
                                                                                            SHA-512:EA3C3F8CFB06AB6E074AD928D2B59BAFA347E522DBFEBA04583336B96B2E9FA30213D268A1D3258C13803553AB28AD647DBEBAF59CD3FA1667288FCF99349351
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 4%
                                                                                            Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................~........................@..............................................@...............................%..................................................................................................................CODE.....}.......~.................. ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................T..............@..P........................................................................................................................................
                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp
                                                                                            File Type:InnoSetup Log DivX Converter, version 0x30, 4807 bytes, 536720\user, "C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11"
                                                                                            Category:dropped
                                                                                            Size (bytes):4807
                                                                                            Entropy (8bit):4.770029584053841
                                                                                            Encrypted:false
                                                                                            SSDEEP:96:pladWP38YpUb8vl99+eOIhwa7ICSss/LnD9zI05:mdWP3zpUW0HIh3ICSsAnj5
                                                                                            MD5:2EB23781C2EE19E8E4CD8302D9193C03
                                                                                            SHA1:F6494F24799C244A5B87DC50AB3F2843A5488187
                                                                                            SHA-256:5303111CF8AE3751F88F3EF30132806147E74262830B626DACE40BB7D4F19168
                                                                                            SHA-512:A437C33F0FDDFCA3C50546252408C73214024799BCDAF4D0E00490D774533B12CC69292FE0F0AED7F14E646BF137253229F9EC6E0D3428DD273B5C74EAD78F8D
                                                                                            Malicious:false
                                                                                            Preview:Inno Setup Uninstall Log (b)....................................DivX Converter..................................................................................................................DivX Converter..................................................................................................................0...........%...............................................................................................................6..S........#m........Y....536720.user:C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11...............j.. ............IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...........................................!MAIN....-1..(...dll:kernel32.dll.CreateFileA..............$...dll:kernel32.dll.WriteFile............"...dll:kernel32.dll.CloseHandle........"...dll:kernel32.dll.ExitProcess........%...d
                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):717985
                                                                                            Entropy (8bit):6.514923513596488
                                                                                            Encrypted:false
                                                                                            SSDEEP:12288:1TPcYn5c/rPx37/zHBA6a5UeYpthr1CERAgrNuR+QIq5MRxyFf:dPcYn5c/rPx37/zHBA6pFptZ1CE9qMRG
                                                                                            MD5:A9C5640ADBBCA1842CD24EFE386C64C8
                                                                                            SHA1:A8591890503649B6B335D6D633D5F0821CCA61C2
                                                                                            SHA-256:5981E4A067B02E2AE0864AA400966EECC8F5408DC65F1A06DF44C946139E9670
                                                                                            SHA-512:EA3C3F8CFB06AB6E074AD928D2B59BAFA347E522DBFEBA04583336B96B2E9FA30213D268A1D3258C13803553AB28AD647DBEBAF59CD3FA1667288FCF99349351
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 4%
                                                                                            Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................~........................@..............................................@...............................%..................................................................................................................CODE.....}.......~.................. ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................T..............@..P........................................................................................................................................
                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):2560
                                                                                            Entropy (8bit):2.8818118453929262
                                                                                            Encrypted:false
                                                                                            SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                                                            MD5:A69559718AB506675E907FE49DEB71E9
                                                                                            SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                                                            SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                                                            SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp
                                                                                            File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):6144
                                                                                            Entropy (8bit):4.289297026665552
                                                                                            Encrypted:false
                                                                                            SSDEEP:48:Sv1LfWvPcXegCPUo1vlZQrAxoONfHFZONfH3d1xCWMBFNL2pGSS4k+bkg6j0KHc:wfkcXegaJ/ZAYNzcld1xaX12pfSKvkc
                                                                                            MD5:C8871EFD8AF2CF4D9D42D1FF8FADBF89
                                                                                            SHA1:D0EACD5322C036554D509C7566F0BCC7607209BD
                                                                                            SHA-256:E4FC574A01B272C2D0AED0EC813F6D75212E2A15A5F5C417129DD65D69768F40
                                                                                            SHA-512:2735BB610060F749E26ACD86F2DF2B8A05F2BDD3DCCF3E4B2946EBB21BA0805FB492C474B1EEB2C5B8BF1A421F7C1B8728245F649C644F4A9ECC5BD8770A16F6
                                                                                            Malicious:false
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....HP..........#............................@.............................`..............................................................<!.......P.......@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc........P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):23312
                                                                                            Entropy (8bit):4.596242908851566
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                                                            MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                                                            SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                                                            SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                                                            SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                                                            Malicious:false
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\Desktop\vwZcJ81cpN.exe
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):706560
                                                                                            Entropy (8bit):6.5063746606736395
                                                                                            Encrypted:false
                                                                                            SSDEEP:12288:dTPcYn5c/rPx37/zHBA6a5UeYpthr1CERAgrNuR+QIq5MRxyF:1PcYn5c/rPx37/zHBA6pFptZ1CE9qMRU
                                                                                            MD5:397E7773A205B3947EEE196EA2F624B9
                                                                                            SHA1:6B3A5F48A8AE1F1395832B1051AC29AFF476FF9D
                                                                                            SHA-256:B33DC9C980150F8C15E73FE115271711CFA3FBAD37BAD63CD36E2A449D571182
                                                                                            SHA-512:2815C67A890E946E217C5B6032E7A32FD8967C940938E95FAF0D5B99B37BE1B567AFBE3811EC38A088D923036F1914763AC4F7033B8B022F636DD4FB7968E517
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 4%
                                                                                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................~........................@..............................................@...............................%..................................................................................................................CODE.....}.......~.................. ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................T..............@..P........................................................................................................................................
                                                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Entropy (8bit):7.997598934790829
                                                                                            TrID:
                                                                                            • Win32 Executable (generic) a (10002005/4) 98.73%
                                                                                            • Inno Setup installer (109748/4) 1.08%
                                                                                            • Windows Screen Saver (13104/52) 0.13%
                                                                                            • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                            File name:vwZcJ81cpN.exe
                                                                                            File size:3'351'818 bytes
                                                                                            MD5:8d647e31e2e4241606104564b0efa364
                                                                                            SHA1:427e9cd7cfb80db43c21187117c927397f21e774
                                                                                            SHA256:08b3976cf68e5714f6bded88a0aea5820946e94bdab8f88bf9c2792d51d21169
                                                                                            SHA512:0d50535e8795581961e5a9c0fe300db983b417168861f03692544414019741c989e6867285a053362e3b6496f31a24ff89e131dc4f10c9ed1fc005a9ca9de0eb
                                                                                            SSDEEP:98304:Me2+PsttllRq2vrpH/vC61RO5+2fOBYKPT6V:XDP0lRr9HnC6jO5+aEYTV
                                                                                            TLSH:90F5335098C7D836E6B34CF66C50842D8066FA63B6B711C83AFC8DED1FAA1585917F0B
                                                                                            File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                                            Icon Hash:2d2e3797b32b2b99
                                                                                            Entrypoint:0x40a5f8
                                                                                            Entrypoint Section:CODE
                                                                                            Digitally signed:false
                                                                                            Imagebase:0x400000
                                                                                            Subsystem:windows gui
                                                                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                                            DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                            Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                                                            TLS Callbacks:
                                                                                            CLR (.Net) Version:
                                                                                            OS Version Major:1
                                                                                            OS Version Minor:0
                                                                                            File Version Major:1
                                                                                            File Version Minor:0
                                                                                            Subsystem Version Major:1
                                                                                            Subsystem Version Minor:0
                                                                                            Import Hash:884310b1928934402ea6fec1dbd3cf5e
                                                                                            Instruction
                                                                                            push ebp
                                                                                            mov ebp, esp
                                                                                            add esp, FFFFFFC4h
                                                                                            push ebx
                                                                                            push esi
                                                                                            push edi
                                                                                            xor eax, eax
                                                                                            mov dword ptr [ebp-10h], eax
                                                                                            mov dword ptr [ebp-24h], eax
                                                                                            call 00007F978C7F8A13h
                                                                                            call 00007F978C7F9C1Ah
                                                                                            call 00007F978C7F9EA9h
                                                                                            call 00007F978C7F9F4Ch
                                                                                            call 00007F978C7FBEEBh
                                                                                            call 00007F978C7FE856h
                                                                                            call 00007F978C7FE9BDh
                                                                                            xor eax, eax
                                                                                            push ebp
                                                                                            push 0040ACC9h
                                                                                            push dword ptr fs:[eax]
                                                                                            mov dword ptr fs:[eax], esp
                                                                                            xor edx, edx
                                                                                            push ebp
                                                                                            push 0040AC92h
                                                                                            push dword ptr fs:[edx]
                                                                                            mov dword ptr fs:[edx], esp
                                                                                            mov eax, dword ptr [0040C014h]
                                                                                            call 00007F978C7FF46Bh
                                                                                            call 00007F978C7FF056h
                                                                                            cmp byte ptr [0040B234h], 00000000h
                                                                                            je 00007F978C7FFF4Eh
                                                                                            call 00007F978C7FF568h
                                                                                            xor eax, eax
                                                                                            call 00007F978C7F9709h
                                                                                            lea edx, dword ptr [ebp-10h]
                                                                                            xor eax, eax
                                                                                            call 00007F978C7FC4FBh
                                                                                            mov edx, dword ptr [ebp-10h]
                                                                                            mov eax, 0040CE28h
                                                                                            call 00007F978C7F8AAAh
                                                                                            push 00000002h
                                                                                            push 00000000h
                                                                                            push 00000001h
                                                                                            mov ecx, dword ptr [0040CE28h]
                                                                                            mov dl, 01h
                                                                                            mov eax, 0040738Ch
                                                                                            call 00007F978C7FCD8Ah
                                                                                            mov dword ptr [0040CE2Ch], eax
                                                                                            xor edx, edx
                                                                                            push ebp
                                                                                            push 0040AC4Ah
                                                                                            push dword ptr fs:[edx]
                                                                                            mov dword ptr fs:[edx], esp
                                                                                            call 00007F978C7FF4C6h
                                                                                            mov dword ptr [0040CE34h], eax
                                                                                            mov eax, dword ptr [0040CE34h]
                                                                                            cmp dword ptr [eax+0Ch], 00000000h
                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2c00.rsrc
                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                            CODE0x10000x9d300x9e00c3bd95c4b1a8e5199981e0d9b45fd18cFalse0.6052709651898734data6.631765876950794IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                            DATA0xb0000x2500x4001ee71d84f1c77af85f1f5c278f880572False0.306640625data2.751820662285145IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                            BSS0xc0000xe8c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                            .idata0xd0000x9500xa00bb5485bf968b970e5ea81292af2acdbaFalse0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                            .tls0xe0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                            .rdata0xf0000x180x2009ba824905bf9c7922b6fc87a38b74366False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                            .reloc0x100000x8c40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                            .rsrc0x110000x2c000x2c0016770d5de6055c5a457207bd5a6d41c0False0.3251065340909091data4.490244109964198IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                            RT_ICON0x113540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                                                                                            RT_ICON0x1147c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                                                                                            RT_ICON0x119e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                                                                                            RT_ICON0x11ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                                                                                            RT_STRING0x125740x2f2data0.35543766578249336
                                                                                            RT_STRING0x128680x30cdata0.3871794871794872
                                                                                            RT_STRING0x12b740x2cedata0.42618384401114207
                                                                                            RT_STRING0x12e440x68data0.75
                                                                                            RT_STRING0x12eac0xb4data0.6277777777777778
                                                                                            RT_STRING0x12f600xaedata0.5344827586206896
                                                                                            RT_RCDATA0x130100x2cdata1.1590909090909092
                                                                                            RT_GROUP_ICON0x1303c0x3edataEnglishUnited States0.8387096774193549
                                                                                            RT_VERSION0x1307c0x4f4dataEnglishUnited States0.2586750788643533
                                                                                            RT_MANIFEST0x135700x5a4XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.42590027700831024
                                                                                            DLLImport
                                                                                            kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                                                                                            user32.dllMessageBoxA
                                                                                            oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                                                                                            advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                                                                                            kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                                                                                            user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                                                                                            comctl32.dllInitCommonControls
                                                                                            advapi32.dllAdjustTokenPrivileges
                                                                                            Language of compilation systemCountry where language is spokenMap
                                                                                            DutchNetherlands
                                                                                            EnglishUnited States
                                                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                            2024-12-23T09:14:14.152841+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049817188.119.66.185443TCP
                                                                                            2024-12-23T09:14:14.961400+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049817188.119.66.185443TCP
                                                                                            2024-12-23T09:14:19.978748+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049834188.119.66.185443TCP
                                                                                            2024-12-23T09:14:20.694356+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049834188.119.66.185443TCP
                                                                                            2024-12-23T09:14:22.422455+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049840188.119.66.185443TCP
                                                                                            2024-12-23T09:14:23.216575+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049840188.119.66.185443TCP
                                                                                            2024-12-23T09:14:24.901414+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049847188.119.66.185443TCP
                                                                                            2024-12-23T09:14:25.604252+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049847188.119.66.185443TCP
                                                                                            2024-12-23T09:14:27.366550+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049853188.119.66.185443TCP
                                                                                            2024-12-23T09:14:28.067338+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049853188.119.66.185443TCP
                                                                                            2024-12-23T09:14:29.819485+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049860188.119.66.185443TCP
                                                                                            2024-12-23T09:14:30.504088+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049860188.119.66.185443TCP
                                                                                            2024-12-23T09:14:32.126103+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049869188.119.66.185443TCP
                                                                                            2024-12-23T09:14:32.846990+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049869188.119.66.185443TCP
                                                                                            2024-12-23T09:14:34.413881+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049875188.119.66.185443TCP
                                                                                            2024-12-23T09:14:35.101914+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049875188.119.66.185443TCP
                                                                                            2024-12-23T09:14:36.765043+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049881188.119.66.185443TCP
                                                                                            2024-12-23T09:14:37.450816+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049881188.119.66.185443TCP
                                                                                            2024-12-23T09:14:39.066018+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049887188.119.66.185443TCP
                                                                                            2024-12-23T09:14:39.751690+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049887188.119.66.185443TCP
                                                                                            2024-12-23T09:14:41.320641+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049894188.119.66.185443TCP
                                                                                            2024-12-23T09:14:42.004082+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049894188.119.66.185443TCP
                                                                                            2024-12-23T09:14:43.569269+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049900188.119.66.185443TCP
                                                                                            2024-12-23T09:14:44.253431+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049900188.119.66.185443TCP
                                                                                            2024-12-23T09:14:46.106700+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049906188.119.66.185443TCP
                                                                                            2024-12-23T09:14:46.798821+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049906188.119.66.185443TCP
                                                                                            2024-12-23T09:14:48.579819+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049912188.119.66.185443TCP
                                                                                            2024-12-23T09:14:49.283364+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049912188.119.66.185443TCP
                                                                                            2024-12-23T09:14:51.042560+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049918188.119.66.185443TCP
                                                                                            2024-12-23T09:14:51.723893+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049918188.119.66.185443TCP
                                                                                            2024-12-23T09:14:53.500653+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049925188.119.66.185443TCP
                                                                                            2024-12-23T09:14:54.185062+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049925188.119.66.185443TCP
                                                                                            2024-12-23T09:14:55.767683+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049932188.119.66.185443TCP
                                                                                            2024-12-23T09:14:56.451028+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049932188.119.66.185443TCP
                                                                                            2024-12-23T09:14:58.030325+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049940188.119.66.185443TCP
                                                                                            2024-12-23T09:14:58.817117+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049940188.119.66.185443TCP
                                                                                            2024-12-23T09:15:00.576248+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049944188.119.66.185443TCP
                                                                                            2024-12-23T09:15:01.260148+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049944188.119.66.185443TCP
                                                                                            2024-12-23T09:15:03.017493+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049952188.119.66.185443TCP
                                                                                            2024-12-23T09:15:03.699777+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049952188.119.66.185443TCP
                                                                                            2024-12-23T09:15:05.270180+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049959188.119.66.185443TCP
                                                                                            2024-12-23T09:15:05.952778+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049959188.119.66.185443TCP
                                                                                            2024-12-23T09:15:07.520587+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049965188.119.66.185443TCP
                                                                                            2024-12-23T09:15:08.209115+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049965188.119.66.185443TCP
                                                                                            2024-12-23T09:15:09.959569+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049970188.119.66.185443TCP
                                                                                            2024-12-23T09:15:10.643460+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049970188.119.66.185443TCP
                                                                                            2024-12-23T09:15:12.396552+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049976188.119.66.185443TCP
                                                                                            2024-12-23T09:15:13.075497+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049976188.119.66.185443TCP
                                                                                            2024-12-23T09:15:14.837089+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049982188.119.66.185443TCP
                                                                                            2024-12-23T09:15:15.523973+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049982188.119.66.185443TCP
                                                                                            2024-12-23T09:15:17.082675+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049988188.119.66.185443TCP
                                                                                            2024-12-23T09:15:17.761353+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049988188.119.66.185443TCP
                                                                                            2024-12-23T09:15:19.668075+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1049995188.119.66.185443TCP
                                                                                            2024-12-23T09:15:20.351055+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049995188.119.66.185443TCP
                                                                                            2024-12-23T09:15:22.330766+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1050001188.119.66.185443TCP
                                                                                            2024-12-23T09:15:23.017560+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1050001188.119.66.185443TCP
                                                                                            2024-12-23T09:15:24.794211+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.1050004188.119.66.185443TCP
                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            Dec 23, 2024 09:14:12.649049044 CET49817443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:12.649091959 CET44349817188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:12.649178982 CET49817443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:12.660610914 CET49817443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:12.660635948 CET44349817188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:14.152627945 CET44349817188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:14.152841091 CET49817443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:14.207459927 CET49817443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:14.207489967 CET44349817188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:14.207835913 CET44349817188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:14.210525036 CET49817443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:14.212748051 CET49817443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:14.255338907 CET44349817188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:14.961404085 CET44349817188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:14.961472034 CET44349817188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:14.961568117 CET49817443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:14.963536024 CET49817443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:14.963550091 CET44349817188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:14.964457989 CET498242024192.168.2.1089.105.201.183
                                                                                            Dec 23, 2024 09:14:15.083949089 CET20244982489.105.201.183192.168.2.10
                                                                                            Dec 23, 2024 09:14:15.084479094 CET498242024192.168.2.1089.105.201.183
                                                                                            Dec 23, 2024 09:14:15.084569931 CET498242024192.168.2.1089.105.201.183
                                                                                            Dec 23, 2024 09:14:15.204155922 CET20244982489.105.201.183192.168.2.10
                                                                                            Dec 23, 2024 09:14:15.207623959 CET498242024192.168.2.1089.105.201.183
                                                                                            Dec 23, 2024 09:14:15.327244043 CET20244982489.105.201.183192.168.2.10
                                                                                            Dec 23, 2024 09:14:16.323033094 CET20244982489.105.201.183192.168.2.10
                                                                                            Dec 23, 2024 09:14:16.364799976 CET498242024192.168.2.1089.105.201.183
                                                                                            Dec 23, 2024 09:14:18.335664034 CET49834443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:18.335730076 CET44349834188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:18.335805893 CET49834443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:18.336124897 CET49834443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:18.336141109 CET44349834188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:19.978672028 CET44349834188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:19.978748083 CET49834443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:19.982393980 CET49834443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:19.982428074 CET44349834188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:19.982774973 CET49834443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:19.982786894 CET44349834188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:20.694363117 CET44349834188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:20.694441080 CET44349834188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:20.694593906 CET49834443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:20.694742918 CET49834443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:20.694772959 CET44349834188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:20.819926023 CET49840443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:20.819982052 CET44349840188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:20.820087910 CET49840443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:20.820436954 CET49840443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:20.820451021 CET44349840188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:22.422291040 CET44349840188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:22.422455072 CET49840443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:22.438815117 CET49840443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:22.438827991 CET44349840188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:22.438987970 CET49840443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:22.438992023 CET44349840188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:23.216602087 CET44349840188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:23.216681004 CET44349840188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:23.216700077 CET49840443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:23.218434095 CET49840443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:23.218434095 CET49840443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:23.218441010 CET498462024192.168.2.1089.105.201.183
                                                                                            Dec 23, 2024 09:14:23.337965965 CET20244984689.105.201.183192.168.2.10
                                                                                            Dec 23, 2024 09:14:23.340547085 CET498462024192.168.2.1089.105.201.183
                                                                                            Dec 23, 2024 09:14:23.340682030 CET498462024192.168.2.1089.105.201.183
                                                                                            Dec 23, 2024 09:14:23.340682983 CET498462024192.168.2.1089.105.201.183
                                                                                            Dec 23, 2024 09:14:23.453022003 CET49847443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:23.453058958 CET44349847188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:23.453130007 CET49847443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:23.453389883 CET49847443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:23.453403950 CET44349847188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:23.460252047 CET20244984689.105.201.183192.168.2.10
                                                                                            Dec 23, 2024 09:14:23.506470919 CET20244984689.105.201.183192.168.2.10
                                                                                            Dec 23, 2024 09:14:23.521169901 CET49840443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:23.521198034 CET44349840188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:24.308666945 CET20244984689.105.201.183192.168.2.10
                                                                                            Dec 23, 2024 09:14:24.308830023 CET498462024192.168.2.1089.105.201.183
                                                                                            Dec 23, 2024 09:14:24.900893927 CET44349847188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:24.901413918 CET49847443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:24.901413918 CET49847443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:24.901429892 CET44349847188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:24.903301001 CET49847443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:24.903307915 CET44349847188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:25.604279041 CET44349847188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:25.604341984 CET44349847188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:25.604487896 CET49847443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:25.604619980 CET49847443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:25.604943037 CET49847443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:25.604959965 CET44349847188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:25.726346970 CET49853443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:25.726408958 CET44349853188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:25.726485968 CET49853443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:25.726742983 CET49853443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:25.726754904 CET44349853188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:27.366466045 CET44349853188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:27.366549969 CET49853443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:27.367024899 CET49853443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:27.367038965 CET44349853188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:27.367139101 CET49853443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:27.367144108 CET44349853188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:28.067295074 CET44349853188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:28.067384005 CET44349853188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:28.067501068 CET49853443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:28.067742109 CET49853443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:28.067742109 CET49853443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:28.179701090 CET49860443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:28.179759979 CET44349860188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:28.179841995 CET49860443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:28.180124998 CET49860443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:28.180139065 CET44349860188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:28.380538940 CET49853443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:28.380563974 CET44349853188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:29.819375038 CET44349860188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:29.819484949 CET49860443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:29.819973946 CET49860443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:29.820008039 CET44349860188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:29.820249081 CET49860443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:29.820262909 CET44349860188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:30.504112005 CET44349860188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:30.504360914 CET49860443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:30.504450083 CET44349860188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:30.504523039 CET49860443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:30.504533052 CET44349860188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:30.504565954 CET49860443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:30.504590988 CET44349860188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:30.504620075 CET49860443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:30.504620075 CET49860443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:30.504666090 CET49860443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:30.617927074 CET49869443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:30.617981911 CET44349869188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:30.618185043 CET49869443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:30.618654966 CET49869443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:30.618673086 CET44349869188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:32.125880957 CET44349869188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:32.126102924 CET49869443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:32.126559019 CET49869443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:32.126568079 CET44349869188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:32.126825094 CET49869443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:32.126830101 CET44349869188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:32.846993923 CET44349869188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:32.847090006 CET44349869188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:32.847280979 CET49869443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:32.847280979 CET49869443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:32.847333908 CET49869443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:32.847349882 CET44349869188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:32.960583925 CET49875443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:32.960623980 CET44349875188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:32.960707903 CET49875443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:32.960949898 CET49875443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:32.960961103 CET44349875188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:34.413717031 CET44349875188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:34.413881063 CET49875443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:34.414412975 CET49875443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:34.414422035 CET44349875188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:34.414606094 CET49875443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:34.414609909 CET44349875188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:35.101943016 CET44349875188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:35.102020025 CET44349875188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:35.102154016 CET49875443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:35.102154016 CET49875443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:35.102327108 CET49875443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:35.102351904 CET44349875188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:35.214133024 CET49881443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:35.214195967 CET44349881188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:35.214359045 CET49881443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:35.214741945 CET49881443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:35.214751959 CET44349881188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:36.764807940 CET44349881188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:36.765043020 CET49881443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:36.765613079 CET49881443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:36.765623093 CET44349881188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:36.765846968 CET49881443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:36.765851021 CET44349881188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:37.450838089 CET44349881188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:37.450911999 CET49881443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:37.450926065 CET44349881188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:37.450968027 CET49881443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:37.451267958 CET49881443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:37.451286077 CET44349881188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:37.570122957 CET49887443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:37.570259094 CET44349887188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:37.570370913 CET49887443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:37.570624113 CET49887443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:37.570662022 CET44349887188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:39.065841913 CET44349887188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:39.066018105 CET49887443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:39.066636086 CET49887443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:39.066667080 CET44349887188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:39.066746950 CET49887443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:39.066759109 CET44349887188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:39.751725912 CET44349887188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:39.751808882 CET44349887188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:39.751812935 CET49887443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:39.751884937 CET49887443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:39.752091885 CET49887443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:39.752139091 CET44349887188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:39.866967916 CET49894443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:39.867002010 CET44349894188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:39.867077112 CET49894443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:39.867532969 CET49894443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:39.867542028 CET44349894188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:41.320571899 CET44349894188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:41.320641041 CET49894443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:41.321199894 CET49894443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:41.321208000 CET44349894188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:41.321374893 CET49894443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:41.321379900 CET44349894188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:42.004123926 CET44349894188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:42.004199028 CET44349894188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:42.004272938 CET49894443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:42.005620956 CET49894443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:42.005636930 CET44349894188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:42.117434978 CET49900443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:42.117499113 CET44349900188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:42.118515968 CET49900443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:42.118813038 CET49900443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:42.118844032 CET44349900188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:43.569206953 CET44349900188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:43.569268942 CET49900443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:43.569699049 CET49900443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:43.569710016 CET44349900188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:43.569869995 CET49900443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:43.569880962 CET44349900188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:44.253513098 CET44349900188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:44.253607988 CET44349900188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:44.253755093 CET49900443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:44.254004002 CET49900443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:44.254044056 CET44349900188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:44.366888046 CET49906443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:44.366947889 CET44349906188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:44.368441105 CET49906443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:44.368705988 CET49906443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:44.368721962 CET44349906188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:46.106630087 CET44349906188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:46.106699944 CET49906443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:46.107239008 CET49906443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:46.107249022 CET44349906188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:46.107426882 CET49906443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:46.107433081 CET44349906188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:46.798868895 CET44349906188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:46.798953056 CET44349906188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:46.799031019 CET49906443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:46.799220085 CET49906443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:46.799238920 CET44349906188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:46.914191008 CET49912443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:46.914246082 CET44349912188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:46.914427042 CET49912443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:46.914685965 CET49912443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:46.914702892 CET44349912188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:48.579694033 CET44349912188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:48.579818964 CET49912443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:48.580532074 CET49912443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:48.580538988 CET44349912188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:48.580760002 CET49912443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:48.580765009 CET44349912188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:49.283384085 CET44349912188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:49.283447027 CET44349912188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:49.283463955 CET49912443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:49.283533096 CET49912443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:49.283843040 CET49912443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:49.283863068 CET44349912188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:49.401958942 CET49918443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:49.402053118 CET44349918188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:49.402178049 CET49918443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:49.402520895 CET49918443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:49.402553082 CET44349918188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:51.042479992 CET44349918188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:51.042560101 CET49918443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:51.059282064 CET49918443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:51.059348106 CET44349918188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:51.059503078 CET49918443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:51.059518099 CET44349918188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:51.723898888 CET44349918188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:51.723980904 CET44349918188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:51.724045038 CET49918443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:51.727675915 CET49918443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:51.727711916 CET44349918188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:51.851308107 CET49925443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:51.851430893 CET44349925188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:51.851543903 CET49925443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:51.851885080 CET49925443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:51.851916075 CET44349925188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:53.500519037 CET44349925188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:53.500653028 CET49925443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:53.501149893 CET49925443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:53.501156092 CET44349925188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:53.501337051 CET49925443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:53.501339912 CET44349925188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:54.185082912 CET44349925188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:54.185161114 CET49925443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:54.185165882 CET44349925188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:54.185211897 CET49925443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:54.185504913 CET49925443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:54.185523033 CET44349925188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:54.304728985 CET49932443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:54.304836988 CET44349932188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:54.305042982 CET49932443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:54.305550098 CET49932443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:54.305586100 CET44349932188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:55.767451048 CET44349932188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:55.767683029 CET49932443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:55.768146992 CET49932443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:55.768179893 CET44349932188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:55.770657063 CET49932443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:55.770739079 CET44349932188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:56.451147079 CET44349932188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:56.451308966 CET44349932188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:56.451303005 CET49932443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:56.451400042 CET49932443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:56.451589108 CET49932443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:56.451639891 CET44349932188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:56.570163965 CET49940443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:56.570174932 CET44349940188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:56.570240021 CET49940443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:56.570509911 CET49940443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:56.570521116 CET44349940188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:58.030226946 CET44349940188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:58.030324936 CET49940443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:58.072767019 CET49940443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:58.072778940 CET44349940188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:58.072957039 CET49940443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:58.072961092 CET44349940188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:58.817205906 CET44349940188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:58.817542076 CET49940443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:58.817572117 CET44349940188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:58.817629099 CET49940443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:58.817635059 CET44349940188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:58.817682028 CET49940443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:58.817816019 CET44349940188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:58.817853928 CET49940443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:58.817861080 CET44349940188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:58.817872047 CET49940443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:58.935226917 CET49944443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:58.935305119 CET44349944188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:14:58.935390949 CET49944443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:58.936316013 CET49944443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:14:58.936336994 CET44349944188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:00.576102972 CET44349944188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:00.576247931 CET49944443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:00.576679945 CET49944443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:00.576694012 CET44349944188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:00.576868057 CET49944443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:00.576874018 CET44349944188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:01.259860039 CET44349944188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:01.259937048 CET44349944188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:01.259958982 CET49944443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:01.259996891 CET49944443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:01.260268927 CET49944443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:01.260298014 CET44349944188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:01.367099047 CET49952443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:01.367182016 CET44349952188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:01.367300034 CET49952443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:01.374465942 CET49952443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:01.374494076 CET44349952188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:03.017199039 CET44349952188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:03.017493010 CET49952443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:03.018282890 CET49952443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:03.018301010 CET44349952188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:03.018448114 CET49952443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:03.018455982 CET44349952188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:03.699819088 CET44349952188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:03.699891090 CET49952443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:03.699915886 CET44349952188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:03.699937105 CET44349952188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:03.699964046 CET49952443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:03.699987888 CET49952443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:03.700228930 CET49952443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:03.700251102 CET44349952188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:03.820077896 CET49959443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:03.820164919 CET44349959188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:03.820290089 CET49959443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:03.820532084 CET49959443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:03.820560932 CET44349959188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:05.270109892 CET44349959188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:05.270179987 CET49959443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:05.270669937 CET49959443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:05.270687103 CET44349959188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:05.270859957 CET49959443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:05.270868063 CET44349959188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:05.952781916 CET44349959188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:05.952832937 CET49959443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:05.952837944 CET44349959188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:05.952882051 CET49959443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:05.953082085 CET49959443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:05.953100920 CET44349959188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:06.070306063 CET49965443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:06.070365906 CET44349965188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:06.070545912 CET49965443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:06.070713997 CET49965443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:06.070728064 CET44349965188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:07.520435095 CET44349965188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:07.520586967 CET49965443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:07.521018028 CET49965443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:07.521035910 CET44349965188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:07.521471024 CET49965443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:07.521476984 CET44349965188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:08.209098101 CET44349965188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:08.209187031 CET44349965188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:08.209233999 CET49965443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:08.209234953 CET49965443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:08.209445953 CET49965443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:08.209470987 CET44349965188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:08.319993019 CET49970443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:08.320034981 CET44349970188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:08.320116997 CET49970443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:08.320482016 CET49970443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:08.320493937 CET44349970188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:09.959505081 CET44349970188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:09.959568977 CET49970443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:09.960009098 CET49970443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:09.960016012 CET44349970188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:09.960221052 CET49970443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:09.960225105 CET44349970188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:10.643461943 CET44349970188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:10.643523932 CET44349970188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:10.643526077 CET49970443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:10.643582106 CET49970443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:10.643748999 CET49970443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:10.643762112 CET44349970188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:10.757621050 CET49976443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:10.757652044 CET44349976188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:10.757817030 CET49976443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:10.758021116 CET49976443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:10.758029938 CET44349976188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:12.396404982 CET44349976188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:12.396552086 CET49976443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:12.397273064 CET49976443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:12.397279024 CET44349976188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:12.397547007 CET49976443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:12.397552013 CET44349976188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:13.075505972 CET44349976188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:13.075582981 CET44349976188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:13.075675964 CET49976443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:13.076138973 CET49976443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:13.076138973 CET49976443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:13.195354939 CET49982443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:13.195451975 CET44349982188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:13.195595980 CET49982443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:13.195986986 CET49982443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:13.196032047 CET44349982188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:13.380487919 CET49976443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:13.380506039 CET44349976188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:14.836977005 CET44349982188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:14.837089062 CET49982443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:14.837713003 CET49982443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:14.837724924 CET44349982188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:14.837898016 CET49982443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:14.837904930 CET44349982188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:15.524003029 CET44349982188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:15.524084091 CET44349982188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:15.524178028 CET49982443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:15.524343967 CET49982443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:15.524363041 CET44349982188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:15.634936094 CET49988443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:15.634979010 CET44349988188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:15.635103941 CET49988443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:15.635340929 CET49988443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:15.635350943 CET44349988188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:17.082529068 CET44349988188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:17.082674980 CET49988443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:17.083131075 CET49988443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:17.083139896 CET44349988188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:17.085622072 CET49988443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:17.085629940 CET44349988188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:17.761389017 CET44349988188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:17.761538982 CET44349988188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:17.761682987 CET49988443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:17.879271030 CET49988443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:17.879304886 CET44349988188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:18.215213060 CET49995443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:18.215301991 CET44349995188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:18.215394974 CET49995443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:18.215837955 CET49995443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:18.215852976 CET44349995188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:19.668001890 CET44349995188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:19.668075085 CET49995443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:19.668589115 CET49995443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:19.668617964 CET44349995188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:19.671350002 CET49995443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:19.671365976 CET44349995188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:20.351083040 CET44349995188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:20.351139069 CET49995443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:20.351169109 CET44349995188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:20.351367950 CET49995443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:20.353838921 CET49995443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:20.353890896 CET44349995188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:20.866214037 CET50001443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:20.866245985 CET44350001188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:20.867048025 CET50001443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:20.867911100 CET50001443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:20.867925882 CET44350001188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:22.330698967 CET44350001188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:22.330765963 CET50001443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:22.331532955 CET50001443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:22.331543922 CET44350001188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:22.333905935 CET50001443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:22.333916903 CET44350001188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:23.017580032 CET44350001188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:23.017661095 CET44350001188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:23.017834902 CET50001443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:23.017982960 CET50001443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:23.017999887 CET44350001188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:23.150749922 CET50004443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:23.150799990 CET44350004188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:23.154618025 CET50004443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:23.154999971 CET50004443192.168.2.10188.119.66.185
                                                                                            Dec 23, 2024 09:15:23.155013084 CET44350004188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:24.794024944 CET44350004188.119.66.185192.168.2.10
                                                                                            Dec 23, 2024 09:15:24.794210911 CET50004443192.168.2.10188.119.66.185
                                                                                            • 188.119.66.185
                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            0192.168.2.1049817188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:14:14 UTC283OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b82a8dcd6c946851e30088813250aa158405633775b0e650f3ba1e9c95b1c92975ccf55bc592fe5a818ece02a1b7e2984c57cad7021dda3a2018d53585 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:14:14 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:14:14 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:14:14 UTC760INData Raw: 32 65 63 0d 0a 38 62 37 32 33 63 36 38 65 65 31 38 34 30 33 63 36 36 30 66 62 66 65 30 33 38 34 37 32 66 62 36 62 66 38 65 38 31 32 32 34 66 62 38 33 64 63 31 39 33 32 63 39 61 37 65 31 36 66 65 30 34 64 64 65 37 36 37 34 62 62 33 35 63 38 64 31 65 33 66 37 38 37 61 61 30 61 66 30 64 39 62 66 35 30 31 64 32 39 39 62 32 63 61 32 39 37 37 64 33 65 61 35 33 63 36 38 38 66 65 34 66 64 64 64 33 39 66 35 35 61 63 62 64 66 35 63 35 30 61 31 64 63 36 64 35 30 37 30 30 64 63 33 32 32 36 30 37 64 32 33 32 38 39 64 65 64 33 39 34 35 64 34 38 63 32 37 37 33 63 65 37 64 63 30 32 35 34 37 31 31 32 37 30 63 66 65 64 31 37 37 36 62 33 66 30 35 66 61 65 65 65 65 30 35 33 61 64 37 63 64 38 63 63 32 32 65 62 66 37 63 37 66 32 34 62 31 36 38 38 35 32 39 62 33 65 61 66 33 34
                                                                                            Data Ascii: 2ec8b723c68ee18403c660fbfe038472fb6bf8e81224fb83dc1932c9a7e16fe04dde7674bb35c8d1e3f787aa0af0d9bf501d299b2ca2977d3ea53c688fe4fddd39f55acbdf5c50a1dc6d50700dc322607d23289ded3945d48c2773ce7dc0254711270cfed1776b3f05faeeee053ad7cd8cc22ebf7c7f24b1688529b3eaf34


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            1192.168.2.1049834188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:14:19 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:14:20 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:14:20 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:14:20 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            2192.168.2.1049840188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:14:22 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:14:23 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:14:23 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:14:23 UTC616INData Raw: 32 35 63 0d 0a 38 62 37 32 32 61 37 37 65 34 31 66 35 35 32 63 33 34 34 38 61 33 65 34 36 64 32 30 37 66 65 38 62 33 38 66 38 36 33 66 35 33 62 61 33 64 63 31 39 33 32 37 38 37 36 64 34 34 62 31 34 31 38 35 38 38 32 34 30 37 65 62 31 63 64 37 30 64 33 65 36 64 32 39 66 62 65 39 35 34 66 36 62 32 34 30 64 64 39 64 62 61 63 38 33 37 37 35 64 32 66 66 35 35 63 64 38 38 66 61 34 38 64 36 63 63 39 64 35 37 61 65 61 38 66 37 63 31 30 32 30 30 63 37 64 36 30 35 31 35 64 66 33 34 32 63 30 37 64 35 33 33 39 32 64 30 64 33 38 61 35 63 34 65 63 65 37 61 33 35 66 39 64 64 30 36 35 65 36 37 31 32 36 63 63 66 66 33 31 36 36 38 62 38 66 35 35 65 62 30 65 66 65 66 35 37 61 30 37 30 63 36 63 61 32 31 66 65 66 35 63 65 66 32 34 38 31 33 38 61 34 36 39 65 33 38 62 31 33 35
                                                                                            Data Ascii: 25c8b722a77e41f552c3448a3e46d207fe8b38f863f53ba3dc19327876d44b14185882407eb1cd70d3e6d29fbe954f6b240dd9dbac83775d2ff55cd88fa48d6cc9d57aea8f7c10200c7d60515df342c07d53392d0d38a5c4ece7a35f9dd065e67126ccff31668b8f55eb0efef57a070c6ca21fef5cef248138a469e38b135


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            3192.168.2.1049847188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:14:24 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:14:25 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:14:25 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:14:25 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            4192.168.2.1049853188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:14:27 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:14:28 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:14:27 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:14:28 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            5192.168.2.1049860188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:14:29 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:14:30 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:14:30 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:14:30 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            6192.168.2.1049869188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:14:32 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:14:32 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:14:32 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:14:32 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            7192.168.2.1049875188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:14:34 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:14:35 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:14:34 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:14:35 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            8192.168.2.1049881188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:14:36 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:14:37 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:14:37 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:14:37 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            9192.168.2.1049887188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:14:39 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:14:39 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:14:39 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:14:39 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            10192.168.2.1049894188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:14:41 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:14:42 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:14:41 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:14:42 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            11192.168.2.1049900188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:14:43 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:14:44 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:14:44 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:14:44 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            12192.168.2.1049906188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:14:46 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:14:46 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:14:46 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:14:46 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            13192.168.2.1049912188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:14:48 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:14:49 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:14:49 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:14:49 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            14192.168.2.1049918188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:14:51 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:14:51 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:14:51 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:14:51 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            15192.168.2.1049925188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:14:53 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:14:54 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:14:53 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:14:54 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            16192.168.2.1049932188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:14:55 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:14:56 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:14:56 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:14:56 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            17192.168.2.1049940188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:14:58 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:14:58 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:14:58 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:14:58 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            18192.168.2.1049944188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:15:00 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:15:01 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:15:01 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:15:01 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            19192.168.2.1049952188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:15:03 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:15:03 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:15:03 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:15:03 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            20192.168.2.1049959188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:15:05 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:15:05 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:15:05 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:15:05 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            21192.168.2.1049965188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:15:07 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:15:08 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:15:07 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:15:08 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            22192.168.2.1049970188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:15:09 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:15:10 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:15:10 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:15:10 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            23192.168.2.1049976188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:15:12 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:15:13 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:15:12 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:15:13 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            24192.168.2.1049982188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:15:14 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:15:15 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:15:15 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:15:15 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            25192.168.2.1049988188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:15:17 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:15:17 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:15:17 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:15:17 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            26192.168.2.1049995188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:15:19 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:15:20 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:15:20 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:15:20 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            27192.168.2.1050001188.119.66.1854437356C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-12-23 08:15:22 UTC291OUTGET /ai/?key=8f3f2b3ab913463e2a4cb7a3231e72eee7c4db7e40b92a8dcd6c946b46b3478c9e7c4ce711c34f7f637af3b70caaf94cda9fa6967478d3f44cc588fa45d7d69a43faeaa5960502d18f414ad332231ad73988d5d49154 HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                            Host: 188.119.66.185
                                                                                            2024-12-23 08:15:23 UTC200INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0 (Ubuntu)
                                                                                            Date: Mon, 23 Dec 2024 08:15:22 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            X-Powered-By: PHP/7.4.33
                                                                                            2024-12-23 08:15:23 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                            Data Ascii: e8b723663ec13250


                                                                                            Click to jump to process

                                                                                            Click to jump to process

                                                                                            Click to dive into process behavior distribution

                                                                                            Click to jump to process

                                                                                            Target ID:0
                                                                                            Start time:03:13:17
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Users\user\Desktop\vwZcJ81cpN.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\Desktop\vwZcJ81cpN.exe"
                                                                                            Imagebase:0x400000
                                                                                            File size:3'351'818 bytes
                                                                                            MD5 hash:8D647E31E2E4241606104564B0EFA364
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:low
                                                                                            Has exited:false

                                                                                            Target ID:1
                                                                                            Start time:03:13:17
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\AppData\Local\Temp\is-HJ9N6.tmp\vwZcJ81cpN.tmp" /SL5="$204A8,3102839,56832,C:\Users\user\Desktop\vwZcJ81cpN.exe"
                                                                                            Imagebase:0x400000
                                                                                            File size:706'560 bytes
                                                                                            MD5 hash:397E7773A205B3947EEE196EA2F624B9
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Antivirus matches:
                                                                                            • Detection: 4%, ReversingLabs
                                                                                            Reputation:low
                                                                                            Has exited:false

                                                                                            Target ID:3
                                                                                            Start time:03:13:18
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe" -i
                                                                                            Imagebase:0x400000
                                                                                            File size:3'148'960 bytes
                                                                                            MD5 hash:8FB49FA4DAF45523188E06A18EB4B95A
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000003.00000000.1301885529.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000003.00000002.2547188110.0000000002B8E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe, Author: Joe Security
                                                                                            Antivirus matches:
                                                                                            • Detection: 100%, Joe Sandbox ML
                                                                                            • Detection: 52%, ReversingLabs
                                                                                            Reputation:low
                                                                                            Has exited:false

                                                                                            Reset < >

                                                                                              Execution Graph

                                                                                              Execution Coverage:21.4%
                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                              Signature Coverage:2.4%
                                                                                              Total number of Nodes:1520
                                                                                              Total number of Limit Nodes:22
                                                                                              execution_graph 5460 407548 5461 407554 CloseHandle 5460->5461 5462 40755d 5460->5462 5461->5462 6697 402b48 RaiseException 5902 407749 5903 4076dc WriteFile 5902->5903 5912 407724 5902->5912 5904 4076e8 5903->5904 5905 4076ef 5903->5905 5906 40748c 35 API calls 5904->5906 5907 407700 5905->5907 5908 4073ec 34 API calls 5905->5908 5906->5905 5908->5907 5909 4078db InterlockedExchange 5910 4078e7 5909->5910 5911 4077e0 5911->5909 5913 407890 5911->5913 5912->5902 5912->5911 6698 40294a 6699 402952 6698->6699 6700 403554 4 API calls 6699->6700 6701 402967 6699->6701 6700->6699 6702 403f4a 6703 403f53 6702->6703 6704 403f5c 6702->6704 6706 403f07 6703->6706 6707 403f09 6706->6707 6708 403e9c 6707->6708 6712 403154 4 API calls 6707->6712 6718 403f3d 6707->6718 6729 403e9c 6707->6729 6709 403f3c 6708->6709 6711 403ef2 6708->6711 6713 403ea9 6708->6713 6720 403e8e 6708->6720 6709->6704 6716 402674 4 API calls 6711->6716 6712->6707 6714 403ecf 6713->6714 6719 402674 4 API calls 6713->6719 6714->6704 6716->6714 6718->6704 6719->6714 6721 403e4c 6720->6721 6722 403e62 6721->6722 6723 403e7b 6721->6723 6725 403e67 6721->6725 6724 403cc8 4 API calls 6722->6724 6726 402674 4 API calls 6723->6726 6724->6725 6727 403e78 6725->6727 6728 402674 4 API calls 6725->6728 6726->6727 6727->6711 6727->6713 6728->6727 6730 403ed7 6729->6730 6736 403ea9 6729->6736 6731 403ef2 6730->6731 6732 403e8e 4 API calls 6730->6732 6733 402674 4 API calls 6731->6733 6735 403ee6 6732->6735 6734 403ecf 6733->6734 6734->6707 6735->6731 6735->6736 6736->6734 6737 402674 4 API calls 6736->6737 6737->6734 6256 40ac4f 6257 40abc1 6256->6257 6258 4094d8 9 API calls 6257->6258 6260 40abed 6257->6260 6258->6260 6259 40ac06 6261 40ac1a 6259->6261 6262 40ac0f DestroyWindow 6259->6262 6260->6259 6263 40ac00 RemoveDirectoryA 6260->6263 6264 40ac42 6261->6264 6265 40357c 4 API calls 6261->6265 6262->6261 6263->6259 6266 40ac38 6265->6266 6267 4025ac 4 API calls 6266->6267 6267->6264 6268 403a52 6269 403a74 6268->6269 6270 403a5a WriteFile 6268->6270 6270->6269 6271 403a78 GetLastError 6270->6271 6271->6269 6272 402654 6273 403154 4 API calls 6272->6273 6274 402614 6273->6274 6275 402632 6274->6275 6276 403154 4 API calls 6274->6276 6275->6275 6276->6275 6277 40ac56 6278 40ac5d 6277->6278 6280 40ac88 6277->6280 6287 409448 6278->6287 6282 403198 4 API calls 6280->6282 6281 40ac62 6281->6280 6284 40ac80 MessageBoxA 6281->6284 6283 40acc0 6282->6283 6285 403198 4 API calls 6283->6285 6284->6280 6286 40acc8 6285->6286 6288 409454 GetCurrentProcess OpenProcessToken 6287->6288 6289 4094af ExitWindowsEx 6287->6289 6290 409466 6288->6290 6291 40946a LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6288->6291 6289->6290 6290->6281 6291->6289 6291->6290 6746 40995e 6747 409960 6746->6747 6748 409982 6747->6748 6749 40999e CallWindowProcA 6747->6749 6749->6748 6750 409960 6751 40996f 6750->6751 6752 409982 6750->6752 6751->6752 6753 40999e CallWindowProcA 6751->6753 6753->6752 6754 405160 6755 405173 6754->6755 6756 404e58 33 API calls 6755->6756 6757 405187 6756->6757 6292 402e64 6293 402e69 6292->6293 6294 402e7a RtlUnwind 6293->6294 6295 402e5e 6293->6295 6296 402e9d 6294->6296 5914 40766c SetFilePointer 5915 4076a3 5914->5915 5916 407693 GetLastError 5914->5916 5916->5915 5917 40769c 5916->5917 5918 40748c 35 API calls 5917->5918 5918->5915 6309 40667c IsDBCSLeadByte 6310 406694 6309->6310 6770 403f7d 6771 403fa2 6770->6771 6774 403f84 6770->6774 6773 403e8e 4 API calls 6771->6773 6771->6774 6772 403f8c 6773->6774 6774->6772 6775 402674 4 API calls 6774->6775 6776 403fca 6775->6776 6777 403d02 6779 403d12 6777->6779 6778 403ddf ExitProcess 6779->6778 6780 403db8 6779->6780 6782 403dea 6779->6782 6786 403da4 6779->6786 6787 403d8f MessageBoxA 6779->6787 6781 403cc8 4 API calls 6780->6781 6783 403dc2 6781->6783 6784 403cc8 4 API calls 6783->6784 6785 403dcc 6784->6785 6797 4019dc 6785->6797 6793 403fe4 6786->6793 6787->6780 6790 403dd1 6790->6778 6790->6782 6794 403fe8 6793->6794 6795 403f07 4 API calls 6794->6795 6796 404006 6795->6796 6798 401abb 6797->6798 6799 4019ed 6797->6799 6798->6790 6800 401a04 RtlEnterCriticalSection 6799->6800 6801 401a0e LocalFree 6799->6801 6800->6801 6802 401a41 6801->6802 6803 401a2f VirtualFree 6802->6803 6804 401a49 6802->6804 6803->6802 6805 401a70 LocalFree 6804->6805 6806 401a87 6804->6806 6805->6805 6805->6806 6807 401aa9 RtlDeleteCriticalSection 6806->6807 6808 401a9f RtlLeaveCriticalSection 6806->6808 6807->6790 6808->6807 6315 404206 6316 4041cc 6315->6316 6317 40420a 6315->6317 6318 404282 6317->6318 6319 403154 4 API calls 6317->6319 6320 404323 6319->6320 6321 402c08 6322 402c82 6321->6322 6325 402c19 6321->6325 6323 402c56 RtlUnwind 6324 403154 4 API calls 6323->6324 6324->6322 6325->6322 6325->6323 6328 402b28 6325->6328 6329 402b31 RaiseException 6328->6329 6330 402b47 6328->6330 6329->6330 6330->6323 6331 408c10 6332 408c17 6331->6332 6333 403198 4 API calls 6332->6333 6339 408cb1 6333->6339 6334 408cdc 6335 4031b8 4 API calls 6334->6335 6336 408d69 6335->6336 6337 408cc8 6340 4032fc 18 API calls 6337->6340 6338 403278 18 API calls 6338->6339 6339->6334 6339->6337 6339->6338 6341 4032fc 18 API calls 6339->6341 6340->6334 6341->6339 6346 40a814 6347 40a839 6346->6347 6348 40993c 29 API calls 6347->6348 6351 40a83e 6348->6351 6349 40a891 6380 4026c4 GetSystemTime 6349->6380 6351->6349 6354 408dd8 18 API calls 6351->6354 6352 40a896 6353 409330 46 API calls 6352->6353 6355 40a89e 6353->6355 6356 40a86d 6354->6356 6357 4031e8 18 API calls 6355->6357 6360 40a875 MessageBoxA 6356->6360 6358 40a8ab 6357->6358 6359 406928 19 API calls 6358->6359 6361 40a8b8 6359->6361 6360->6349 6362 40a882 6360->6362 6363 4066c0 19 API calls 6361->6363 6364 405864 19 API calls 6362->6364 6365 40a8c8 6363->6365 6364->6349 6366 406638 19 API calls 6365->6366 6367 40a8d9 6366->6367 6368 403340 18 API calls 6367->6368 6369 40a8e7 6368->6369 6370 4031e8 18 API calls 6369->6370 6371 40a8f7 6370->6371 6372 4074e0 37 API calls 6371->6372 6373 40a936 6372->6373 6374 402594 18 API calls 6373->6374 6375 40a956 6374->6375 6376 407a28 19 API calls 6375->6376 6377 40a998 6376->6377 6378 407cb8 35 API calls 6377->6378 6379 40a9bf 6378->6379 6380->6352 5458 407017 5459 407008 SetErrorMode 5458->5459 6381 403018 6382 403070 6381->6382 6383 403025 6381->6383 6384 40302a RtlUnwind 6383->6384 6385 40304e 6384->6385 6387 402f78 6385->6387 6388 402be8 6385->6388 6389 402bf1 RaiseException 6388->6389 6390 402c04 6388->6390 6389->6390 6390->6382 6395 40901e 6396 409010 6395->6396 6397 408fac Wow64RevertWow64FsRedirection 6396->6397 6398 409018 6397->6398 6399 409020 SetLastError 6400 409029 6399->6400 6415 403a28 ReadFile 6416 403a46 6415->6416 6417 403a49 GetLastError 6415->6417 5919 40762c ReadFile 5920 407663 5919->5920 5921 40764c 5919->5921 5922 407652 GetLastError 5921->5922 5923 40765c 5921->5923 5922->5920 5922->5923 5924 40748c 35 API calls 5923->5924 5924->5920 6819 40712e 6820 407118 6819->6820 6821 403198 4 API calls 6820->6821 6822 407120 6821->6822 6823 403198 4 API calls 6822->6823 6824 407128 6823->6824 5939 40a82f 5940 409ae8 18 API calls 5939->5940 5941 40a834 5940->5941 5942 40a839 5941->5942 5943 402f24 5 API calls 5941->5943 5976 40993c 5942->5976 5943->5942 5945 40a891 5981 4026c4 GetSystemTime 5945->5981 5947 40a83e 5947->5945 6042 408dd8 5947->6042 5948 40a896 5982 409330 5948->5982 5952 40a86d 5956 40a875 MessageBoxA 5952->5956 5953 4031e8 18 API calls 5954 40a8ab 5953->5954 6000 406928 5954->6000 5956->5945 5958 40a882 5956->5958 6045 405864 5958->6045 5963 40a8d9 6027 403340 5963->6027 5965 40a8e7 5966 4031e8 18 API calls 5965->5966 5967 40a8f7 5966->5967 5968 4074e0 37 API calls 5967->5968 5969 40a936 5968->5969 5970 402594 18 API calls 5969->5970 5971 40a956 5970->5971 5972 407a28 19 API calls 5971->5972 5973 40a998 5972->5973 5974 407cb8 35 API calls 5973->5974 5975 40a9bf 5974->5975 6049 40953c 5976->6049 5979 4098cc 19 API calls 5980 40995c 5979->5980 5980->5947 5981->5948 5984 409350 5982->5984 5986 409375 CreateDirectoryA 5984->5986 5991 408dd8 18 API calls 5984->5991 5993 404c94 33 API calls 5984->5993 5996 407284 19 API calls 5984->5996 5998 408da8 18 API calls 5984->5998 5999 405890 18 API calls 5984->5999 6105 406cf4 5984->6105 6128 409224 5984->6128 5987 4093ed 5986->5987 5988 40937f GetLastError 5986->5988 5989 40322c 4 API calls 5987->5989 5988->5984 5990 4093f7 5989->5990 5992 4031b8 4 API calls 5990->5992 5991->5984 5994 409411 5992->5994 5993->5984 5995 4031b8 4 API calls 5994->5995 5997 40941e 5995->5997 5996->5984 5997->5953 5998->5984 5999->5984 6234 406820 6000->6234 6003 403454 18 API calls 6004 40694a 6003->6004 6005 4066c0 6004->6005 6239 4068e4 6005->6239 6008 4066f0 6010 403340 18 API calls 6008->6010 6009 4066fe 6011 403454 18 API calls 6009->6011 6014 4066fc 6010->6014 6012 406711 6011->6012 6013 403340 18 API calls 6012->6013 6013->6014 6015 403198 4 API calls 6014->6015 6016 406733 6015->6016 6017 406638 6016->6017 6018 406642 6017->6018 6019 406665 6017->6019 6245 406950 6018->6245 6020 40322c 4 API calls 6019->6020 6022 40666e 6020->6022 6022->5963 6023 406649 6023->6019 6024 406654 6023->6024 6025 403340 18 API calls 6024->6025 6026 406662 6025->6026 6026->5963 6028 403344 6027->6028 6029 4033a5 6027->6029 6030 4031e8 6028->6030 6031 40334c 6028->6031 6036 403254 18 API calls 6030->6036 6037 4031fc 6030->6037 6031->6029 6033 40335b 6031->6033 6034 4031e8 18 API calls 6031->6034 6032 403228 6032->5965 6035 403254 18 API calls 6033->6035 6034->6033 6039 403375 6035->6039 6036->6037 6037->6032 6038 4025ac 4 API calls 6037->6038 6038->6032 6040 4031e8 18 API calls 6039->6040 6041 4033a1 6040->6041 6041->5965 6043 408da8 18 API calls 6042->6043 6044 408df4 6043->6044 6044->5952 6046 405869 6045->6046 6047 405940 19 API calls 6046->6047 6048 40587b 6047->6048 6048->6048 6056 40955b 6049->6056 6050 409590 6052 40959d GetUserDefaultLangID 6050->6052 6057 409592 6050->6057 6051 409594 6061 407024 GetModuleHandleA GetProcAddress 6051->6061 6052->6057 6055 40956f 6055->5979 6056->6050 6056->6051 6056->6055 6057->6055 6058 4095cb GetACP 6057->6058 6059 4095ef 6057->6059 6058->6055 6058->6057 6059->6055 6060 409615 GetACP 6059->6060 6060->6055 6060->6059 6062 407067 6061->6062 6063 40705e 6061->6063 6064 407070 6062->6064 6065 4070a8 6062->6065 6072 403198 4 API calls 6063->6072 6082 406f68 6064->6082 6066 406f68 RegOpenKeyExA 6065->6066 6070 4070c1 6066->6070 6068 407089 6069 4070de 6068->6069 6085 406f5c 6068->6085 6074 40322c 4 API calls 6069->6074 6070->6069 6073 406f5c 20 API calls 6070->6073 6076 407120 6072->6076 6077 4070d5 RegCloseKey 6073->6077 6078 4070eb 6074->6078 6079 403198 4 API calls 6076->6079 6077->6069 6080 4032fc 18 API calls 6078->6080 6081 407128 6079->6081 6080->6063 6081->6057 6083 406f73 6082->6083 6084 406f79 RegOpenKeyExA 6082->6084 6083->6084 6084->6068 6088 406e10 6085->6088 6089 406e36 RegQueryValueExA 6088->6089 6090 406e7b 6089->6090 6095 406e59 6089->6095 6091 403198 4 API calls 6090->6091 6094 406f47 RegCloseKey 6091->6094 6092 406e73 6093 403198 4 API calls 6092->6093 6093->6090 6094->6069 6095->6090 6095->6092 6096 403278 18 API calls 6095->6096 6097 403420 18 API calls 6095->6097 6096->6095 6098 406eb0 RegQueryValueExA 6097->6098 6098->6089 6099 406ecc 6098->6099 6099->6090 6100 4034f0 18 API calls 6099->6100 6101 406f0e 6100->6101 6102 406f20 6101->6102 6104 403420 18 API calls 6101->6104 6103 4031e8 18 API calls 6102->6103 6103->6090 6104->6102 6147 406a58 6105->6147 6108 406d26 6110 406a58 19 API calls 6108->6110 6113 406d72 6108->6113 6111 406d36 6110->6111 6112 406d42 6111->6112 6114 406a34 21 API calls 6111->6114 6112->6113 6115 406d67 6112->6115 6117 406a58 19 API calls 6112->6117 6155 406888 6113->6155 6114->6112 6115->6113 6167 406cc8 GetWindowsDirectoryA 6115->6167 6121 406d5b 6117->6121 6120 406638 19 API calls 6122 406d87 6120->6122 6121->6115 6124 406a34 21 API calls 6121->6124 6123 40322c 4 API calls 6122->6123 6125 406d91 6123->6125 6124->6115 6126 4031b8 4 API calls 6125->6126 6127 406dab 6126->6127 6127->5984 6129 409244 6128->6129 6130 406638 19 API calls 6129->6130 6131 40925d 6130->6131 6132 40322c 4 API calls 6131->6132 6135 409268 6132->6135 6134 406978 20 API calls 6134->6135 6135->6134 6136 4033b4 18 API calls 6135->6136 6137 408dd8 18 API calls 6135->6137 6139 405890 18 API calls 6135->6139 6140 4092e4 6135->6140 6207 4091b0 6135->6207 6215 409034 6135->6215 6136->6135 6137->6135 6139->6135 6141 40322c 4 API calls 6140->6141 6142 4092ef 6141->6142 6143 4031b8 4 API calls 6142->6143 6144 409309 6143->6144 6145 403198 4 API calls 6144->6145 6146 409311 6145->6146 6146->5984 6148 4034f0 18 API calls 6147->6148 6150 406a6b 6148->6150 6149 406a82 GetEnvironmentVariableA 6149->6150 6151 406a8e 6149->6151 6150->6149 6154 406a95 6150->6154 6169 406dec 6150->6169 6152 403198 4 API calls 6151->6152 6152->6154 6154->6108 6164 406a34 6154->6164 6156 403414 6155->6156 6157 4068ab GetFullPathNameA 6156->6157 6158 4068b7 6157->6158 6159 4068ce 6157->6159 6158->6159 6160 4068bf 6158->6160 6161 40322c 4 API calls 6159->6161 6162 403278 18 API calls 6160->6162 6163 4068cc 6161->6163 6162->6163 6163->6120 6173 4069dc 6164->6173 6168 406ce9 6167->6168 6168->6113 6170 406dfa 6169->6170 6171 4034f0 18 API calls 6170->6171 6172 406e08 6171->6172 6172->6150 6180 406978 6173->6180 6175 4069fe 6176 406a06 GetFileAttributesA 6175->6176 6177 406a1b 6176->6177 6178 403198 4 API calls 6177->6178 6179 406a23 6178->6179 6179->6108 6190 406744 6180->6190 6182 4069b0 6185 4069c6 6182->6185 6186 4069bb 6182->6186 6184 406989 6184->6182 6197 406970 CharPrevA 6184->6197 6198 403454 6185->6198 6187 40322c 4 API calls 6186->6187 6189 4069c4 6187->6189 6189->6175 6191 406755 6190->6191 6192 4067b9 6191->6192 6196 406773 6191->6196 6193 406680 IsDBCSLeadByte 6192->6193 6194 4067b4 6192->6194 6193->6194 6194->6184 6196->6194 6205 406680 IsDBCSLeadByte 6196->6205 6197->6184 6199 403486 6198->6199 6200 403459 6198->6200 6201 403198 4 API calls 6199->6201 6200->6199 6203 40346d 6200->6203 6202 40347c 6201->6202 6202->6189 6204 403278 18 API calls 6203->6204 6204->6202 6206 406694 6205->6206 6206->6196 6208 403198 4 API calls 6207->6208 6210 4091d1 6208->6210 6212 4091fe 6210->6212 6224 4032a8 6210->6224 6227 403494 6210->6227 6213 403198 4 API calls 6212->6213 6214 409213 6213->6214 6214->6135 6216 408f70 2 API calls 6215->6216 6217 40904a 6216->6217 6218 40904e 6217->6218 6231 406a48 6217->6231 6218->6135 6221 409081 6222 408fac Wow64RevertWow64FsRedirection 6221->6222 6223 409089 6222->6223 6223->6135 6225 403278 18 API calls 6224->6225 6226 4032b5 6225->6226 6226->6210 6228 403498 6227->6228 6230 4034c3 6227->6230 6229 4034f0 18 API calls 6228->6229 6229->6230 6230->6210 6232 4069dc 21 API calls 6231->6232 6233 406a52 GetLastError 6232->6233 6233->6221 6235 406744 IsDBCSLeadByte 6234->6235 6237 406835 6235->6237 6236 40687f 6236->6003 6237->6236 6238 406680 IsDBCSLeadByte 6237->6238 6238->6237 6240 4068f3 6239->6240 6241 406820 IsDBCSLeadByte 6240->6241 6244 4068fe 6241->6244 6242 4066ea 6242->6008 6242->6009 6243 406680 IsDBCSLeadByte 6243->6244 6244->6242 6244->6243 6246 406957 6245->6246 6247 40695b 6245->6247 6246->6023 6250 406970 CharPrevA 6247->6250 6249 40696c 6249->6023 6250->6249 6825 408f30 6828 408dfc 6825->6828 6829 408e05 6828->6829 6830 403198 4 API calls 6829->6830 6831 408e13 6829->6831 6830->6829 6832 403932 6833 403924 6832->6833 6834 40374c VariantClear 6833->6834 6835 40392c 6834->6835 5395 4075c4 SetFilePointer 5396 4075f7 5395->5396 5397 4075e7 GetLastError 5395->5397 5397->5396 5398 4075f0 5397->5398 5400 40748c GetLastError 5398->5400 5403 4073ec 5400->5403 5404 407284 19 API calls 5403->5404 5405 407414 5404->5405 5406 407434 5405->5406 5407 405194 33 API calls 5405->5407 5408 405890 18 API calls 5406->5408 5407->5406 5409 407443 5408->5409 5410 403198 4 API calls 5409->5410 5411 407460 5410->5411 5411->5396 6426 4076c8 WriteFile 6427 4076e8 6426->6427 6428 4076ef 6426->6428 6429 40748c 35 API calls 6427->6429 6430 407700 6428->6430 6431 4073ec 34 API calls 6428->6431 6429->6428 6431->6430 6432 402ccc 6435 402cfe 6432->6435 6436 402cdd 6432->6436 6433 402d88 RtlUnwind 6434 403154 4 API calls 6433->6434 6434->6435 6436->6433 6436->6435 6437 402b28 RaiseException 6436->6437 6438 402d7f 6437->6438 6438->6433 6844 403fcd 6845 403f07 4 API calls 6844->6845 6846 403fd6 6845->6846 6847 403e9c 4 API calls 6846->6847 6848 403fe2 6847->6848 6445 4024d0 6446 4024e4 6445->6446 6447 4024e9 6445->6447 6450 401918 4 API calls 6446->6450 6448 402518 6447->6448 6449 40250e RtlEnterCriticalSection 6447->6449 6452 4024ed 6447->6452 6460 402300 6448->6460 6449->6448 6450->6447 6453 402525 6456 402581 6453->6456 6457 402577 RtlLeaveCriticalSection 6453->6457 6455 401fd4 14 API calls 6458 402531 6455->6458 6457->6456 6458->6453 6459 40215c 9 API calls 6458->6459 6459->6453 6461 402314 6460->6461 6463 4023b8 6461->6463 6465 402335 6461->6465 6462 402344 6462->6453 6462->6455 6463->6462 6464 401d80 9 API calls 6463->6464 6468 402455 6463->6468 6470 401e84 6463->6470 6464->6463 6465->6462 6467 401b74 9 API calls 6465->6467 6467->6462 6468->6462 6469 401d00 9 API calls 6468->6469 6469->6462 6475 401768 6470->6475 6472 401ea6 6472->6463 6473 401e99 6473->6472 6474 401dcc 9 API calls 6473->6474 6474->6472 6477 401787 6475->6477 6476 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 6476->6477 6477->6476 6478 40183b 6477->6478 6480 40132c LocalAlloc 6477->6480 6481 401821 6477->6481 6482 4017d6 6477->6482 6479 4015c4 VirtualAlloc 6478->6479 6483 4017e7 6478->6483 6479->6483 6480->6477 6484 40150c VirtualFree 6481->6484 6485 40150c VirtualFree 6482->6485 6483->6473 6484->6483 6485->6483 6486 4028d2 6487 4028da 6486->6487 6488 403554 4 API calls 6487->6488 6489 4028ef 6487->6489 6488->6487 6490 4025ac 4 API calls 6489->6490 6491 4028f4 6490->6491 6849 4019d3 6850 4019ba 6849->6850 6851 4019c3 RtlLeaveCriticalSection 6850->6851 6852 4019cd 6850->6852 6851->6852 5412 407fd4 5413 407fe6 5412->5413 5415 407fed 5412->5415 5423 407f10 5413->5423 5417 408017 5415->5417 5419 408015 5415->5419 5421 408021 5415->5421 5416 40804e 5434 407d7c 5417->5434 5418 407d7c 33 API calls 5418->5416 5437 407e2c 5419->5437 5421->5416 5421->5418 5424 407f25 5423->5424 5425 407d7c 33 API calls 5424->5425 5426 407f34 5424->5426 5425->5426 5427 407f6e 5426->5427 5428 407d7c 33 API calls 5426->5428 5429 407f82 5427->5429 5430 407d7c 33 API calls 5427->5430 5428->5427 5431 407fae 5429->5431 5444 407eb8 5429->5444 5430->5429 5431->5415 5447 4058c4 5434->5447 5436 407d9e 5436->5421 5438 405194 33 API calls 5437->5438 5439 407e57 5438->5439 5455 407de4 5439->5455 5441 407e5f 5442 403198 4 API calls 5441->5442 5443 407e74 5442->5443 5443->5421 5445 407ec7 VirtualFree 5444->5445 5446 407ed9 VirtualAlloc 5444->5446 5445->5446 5446->5431 5449 4058d0 5447->5449 5448 405194 33 API calls 5450 4058fd 5448->5450 5449->5448 5451 4031e8 18 API calls 5450->5451 5452 405908 5451->5452 5453 403198 4 API calls 5452->5453 5454 40591d 5453->5454 5454->5436 5456 4058c4 33 API calls 5455->5456 5457 407e06 5456->5457 5457->5441 6492 405ad4 6493 405adc 6492->6493 6495 405ae4 6492->6495 6494 405aeb 6493->6494 6496 405ae2 6493->6496 6497 405940 19 API calls 6494->6497 6499 405a4c 6496->6499 6497->6495 6500 405a54 6499->6500 6501 405a6e 6500->6501 6502 403154 4 API calls 6500->6502 6503 405a73 6501->6503 6504 405a8a 6501->6504 6502->6500 6506 405940 19 API calls 6503->6506 6505 403154 4 API calls 6504->6505 6507 405a8f 6505->6507 6508 405a86 6506->6508 6509 4059b0 33 API calls 6507->6509 6510 403154 4 API calls 6508->6510 6509->6508 6511 405ab8 6510->6511 6512 403154 4 API calls 6511->6512 6513 405ac6 6512->6513 6513->6495 5925 40a9de 5926 40aa03 5925->5926 5927 407918 InterlockedExchange 5926->5927 5928 40aa2d 5927->5928 5929 40aa3d 5928->5929 5930 409ae8 18 API calls 5928->5930 5935 4076ac SetEndOfFile 5929->5935 5930->5929 5932 40aa59 5933 4025ac 4 API calls 5932->5933 5934 40aa90 5933->5934 5936 4076c3 5935->5936 5937 4076bc 5935->5937 5936->5932 5938 40748c 35 API calls 5937->5938 5938->5936 6856 402be9 RaiseException 6857 402c04 6856->6857 6524 402af2 6525 402afe 6524->6525 6528 402ed0 6525->6528 6529 403154 4 API calls 6528->6529 6531 402ee0 6529->6531 6530 402b03 6531->6530 6533 402b0c 6531->6533 6534 402b25 6533->6534 6535 402b15 RaiseException 6533->6535 6534->6530 6535->6534 5463 40a5f8 5506 4030dc 5463->5506 5465 40a60e 5509 4042e8 5465->5509 5467 40a613 5512 40457c GetModuleHandleA GetProcAddress 5467->5512 5471 40a61d 5520 4065c8 5471->5520 5473 40a622 5529 4090a4 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 5473->5529 5480 40a665 5551 406c2c 5480->5551 5484 4031e8 18 API calls 5485 40a683 5484->5485 5565 4074e0 5485->5565 5491 407918 InterlockedExchange 5494 40a6d2 5491->5494 5492 40a710 5585 4074a0 5492->5585 5494->5492 5622 409ae8 5494->5622 5495 40a751 5589 407a28 5495->5589 5496 40a736 5496->5495 5497 409ae8 18 API calls 5496->5497 5497->5495 5499 40a776 5599 408b08 5499->5599 5503 40a7bc 5504 408b08 35 API calls 5503->5504 5505 40a7f5 5503->5505 5504->5503 5632 403094 5506->5632 5508 4030e1 GetModuleHandleA GetCommandLineA 5508->5465 5510 403154 4 API calls 5509->5510 5511 404323 5509->5511 5510->5511 5511->5467 5513 404598 5512->5513 5514 40459f GetProcAddress 5512->5514 5513->5514 5515 4045b5 GetProcAddress 5514->5515 5516 4045ae 5514->5516 5517 4045c4 SetProcessDEPPolicy 5515->5517 5518 4045c8 5515->5518 5516->5515 5517->5518 5519 404624 6FCB1CD0 5518->5519 5519->5471 5633 405ca8 5520->5633 5530 4090f7 5529->5530 5717 406fa0 SetErrorMode 5530->5717 5533 407284 19 API calls 5534 409127 5533->5534 5535 403198 4 API calls 5534->5535 5536 40913c 5535->5536 5537 409b78 GetSystemInfo VirtualQuery 5536->5537 5538 409c2c 5537->5538 5541 409ba2 5537->5541 5543 409768 5538->5543 5539 409c0d VirtualQuery 5539->5538 5539->5541 5540 409bcc VirtualProtect 5540->5541 5541->5538 5541->5539 5541->5540 5542 409bfb VirtualProtect 5541->5542 5542->5539 5723 406bd0 GetCommandLineA 5543->5723 5545 409850 5547 4031b8 4 API calls 5545->5547 5546 406c2c 20 API calls 5550 409785 5546->5550 5548 40986a 5547->5548 5548->5480 5615 409c88 5548->5615 5549 403454 18 API calls 5549->5550 5550->5545 5550->5546 5550->5549 5552 406c53 GetModuleFileNameA 5551->5552 5553 406c77 GetCommandLineA 5551->5553 5554 403278 18 API calls 5552->5554 5561 406c7c 5553->5561 5555 406c75 5554->5555 5559 406ca4 5555->5559 5556 406c81 5557 403198 4 API calls 5556->5557 5560 406c89 5557->5560 5558 406af0 18 API calls 5558->5561 5562 403198 4 API calls 5559->5562 5563 40322c 4 API calls 5560->5563 5561->5556 5561->5558 5561->5560 5564 406cb9 5562->5564 5563->5559 5564->5484 5566 4074ea 5565->5566 5730 407576 5566->5730 5733 407578 5566->5733 5567 407516 5568 40752a 5567->5568 5569 40748c 35 API calls 5567->5569 5572 409c34 FindResourceA 5568->5572 5569->5568 5573 409c49 5572->5573 5574 409c4e SizeofResource 5572->5574 5575 409ae8 18 API calls 5573->5575 5576 409c60 LoadResource 5574->5576 5577 409c5b 5574->5577 5575->5574 5579 409c73 LockResource 5576->5579 5580 409c6e 5576->5580 5578 409ae8 18 API calls 5577->5578 5578->5576 5582 409c84 5579->5582 5583 409c7f 5579->5583 5581 409ae8 18 API calls 5580->5581 5581->5579 5582->5491 5582->5494 5584 409ae8 18 API calls 5583->5584 5584->5582 5586 4074b4 5585->5586 5587 4074c4 5586->5587 5588 4073ec 34 API calls 5586->5588 5587->5496 5588->5587 5590 407a35 5589->5590 5591 405890 18 API calls 5590->5591 5592 407a89 5590->5592 5591->5592 5593 407918 InterlockedExchange 5592->5593 5594 407a9b 5593->5594 5595 405890 18 API calls 5594->5595 5596 407ab1 5594->5596 5595->5596 5597 407af4 5596->5597 5598 405890 18 API calls 5596->5598 5597->5499 5598->5597 5600 408b39 5599->5600 5613 408b82 5599->5613 5602 407cb8 35 API calls 5600->5602 5605 4034f0 18 API calls 5600->5605 5608 4031e8 18 API calls 5600->5608 5610 403420 18 API calls 5600->5610 5600->5613 5601 408bcd 5736 407cb8 5601->5736 5602->5600 5604 408be4 5607 4031b8 4 API calls 5604->5607 5605->5600 5606 4034f0 18 API calls 5606->5613 5609 408bfe 5607->5609 5608->5600 5629 404c20 5609->5629 5610->5600 5611 403420 18 API calls 5611->5613 5612 4031e8 18 API calls 5612->5613 5613->5601 5613->5606 5613->5611 5613->5612 5614 407cb8 35 API calls 5613->5614 5614->5613 5616 40322c 4 API calls 5615->5616 5617 409cab 5616->5617 5618 409cba MessageBoxA 5617->5618 5619 409ccf 5618->5619 5620 403198 4 API calls 5619->5620 5621 409cd7 5620->5621 5621->5480 5623 409af1 5622->5623 5624 409b09 5622->5624 5625 405890 18 API calls 5623->5625 5626 405890 18 API calls 5624->5626 5627 409b03 5625->5627 5628 409b1a 5626->5628 5627->5492 5628->5492 5758 402594 5629->5758 5631 404c2b 5631->5503 5632->5508 5634 405940 19 API calls 5633->5634 5635 405cb9 5634->5635 5636 405280 GetSystemDefaultLCID 5635->5636 5637 4052b6 5636->5637 5638 4031e8 18 API calls 5637->5638 5639 404cdc 19 API calls 5637->5639 5640 40520c 19 API calls 5637->5640 5643 405318 5637->5643 5638->5637 5639->5637 5640->5637 5641 404cdc 19 API calls 5641->5643 5642 40520c 19 API calls 5642->5643 5643->5641 5643->5642 5644 4031e8 18 API calls 5643->5644 5645 40539b 5643->5645 5644->5643 5646 4031b8 4 API calls 5645->5646 5647 4053b5 5646->5647 5648 4053c4 GetSystemDefaultLCID 5647->5648 5705 40520c GetLocaleInfoA 5648->5705 5651 4031e8 18 API calls 5652 405404 5651->5652 5653 40520c 19 API calls 5652->5653 5654 405419 5653->5654 5655 40520c 19 API calls 5654->5655 5656 40543d 5655->5656 5711 405258 GetLocaleInfoA 5656->5711 5659 405258 GetLocaleInfoA 5660 40546d 5659->5660 5661 40520c 19 API calls 5660->5661 5662 405487 5661->5662 5663 405258 GetLocaleInfoA 5662->5663 5664 4054a4 5663->5664 5665 40520c 19 API calls 5664->5665 5666 4054be 5665->5666 5667 4031e8 18 API calls 5666->5667 5668 4054cb 5667->5668 5669 40520c 19 API calls 5668->5669 5670 4054e0 5669->5670 5671 4031e8 18 API calls 5670->5671 5672 4054ed 5671->5672 5673 405258 GetLocaleInfoA 5672->5673 5674 4054fb 5673->5674 5675 40520c 19 API calls 5674->5675 5676 405515 5675->5676 5677 4031e8 18 API calls 5676->5677 5678 405522 5677->5678 5679 40520c 19 API calls 5678->5679 5680 405537 5679->5680 5681 4031e8 18 API calls 5680->5681 5682 405544 5681->5682 5683 40520c 19 API calls 5682->5683 5684 405559 5683->5684 5685 405576 5684->5685 5686 405567 5684->5686 5688 40322c 4 API calls 5685->5688 5713 40322c 5686->5713 5689 405574 5688->5689 5690 40520c 19 API calls 5689->5690 5691 405598 5690->5691 5692 4055b5 5691->5692 5693 4055a6 5691->5693 5695 403198 4 API calls 5692->5695 5694 40322c 4 API calls 5693->5694 5696 4055b3 5694->5696 5695->5696 5697 4033b4 18 API calls 5696->5697 5698 4055d7 5697->5698 5699 4033b4 18 API calls 5698->5699 5700 4055f1 5699->5700 5701 4031b8 4 API calls 5700->5701 5702 40560b 5701->5702 5703 405cf4 GetVersionExA 5702->5703 5704 405d0b 5703->5704 5704->5473 5706 405233 5705->5706 5707 405245 5705->5707 5708 403278 18 API calls 5706->5708 5709 40322c 4 API calls 5707->5709 5710 405243 5708->5710 5709->5710 5710->5651 5712 405274 5711->5712 5712->5659 5714 403230 5713->5714 5715 403252 5714->5715 5716 4025ac 4 API calls 5714->5716 5715->5689 5716->5715 5721 403414 5717->5721 5720 406fee 5720->5533 5722 403418 LoadLibraryA 5721->5722 5722->5720 5724 406af0 18 API calls 5723->5724 5725 406bf3 5724->5725 5726 406c05 5725->5726 5727 406af0 18 API calls 5725->5727 5728 403198 4 API calls 5726->5728 5727->5725 5729 406c1a 5728->5729 5729->5550 5731 407578 5730->5731 5732 4075b7 CreateFileA 5731->5732 5732->5567 5734 403414 5733->5734 5735 4075b7 CreateFileA 5734->5735 5735->5567 5737 407cd3 5736->5737 5741 407cc8 5736->5741 5742 407c5c 5737->5742 5740 405890 18 API calls 5740->5741 5741->5604 5743 407c70 5742->5743 5744 407caf 5742->5744 5743->5744 5746 407bac 5743->5746 5744->5740 5744->5741 5747 407bb7 5746->5747 5748 407bc8 5746->5748 5749 405890 18 API calls 5747->5749 5750 4074a0 34 API calls 5748->5750 5749->5748 5751 407bdc 5750->5751 5752 4074a0 34 API calls 5751->5752 5753 407bfd 5752->5753 5754 407918 InterlockedExchange 5753->5754 5755 407c12 5754->5755 5756 407c28 5755->5756 5757 405890 18 API calls 5755->5757 5756->5743 5757->5756 5759 402598 5758->5759 5761 4025a2 5758->5761 5764 401fd4 5759->5764 5760 40259e 5760->5761 5762 403154 4 API calls 5760->5762 5761->5631 5761->5761 5762->5761 5765 401fe8 5764->5765 5766 401fed 5764->5766 5775 401918 RtlInitializeCriticalSection 5765->5775 5768 402012 RtlEnterCriticalSection 5766->5768 5769 40201c 5766->5769 5772 401ff1 5766->5772 5768->5769 5769->5772 5782 401ee0 5769->5782 5772->5760 5773 402147 5773->5760 5774 40213d RtlLeaveCriticalSection 5774->5773 5776 40193c RtlEnterCriticalSection 5775->5776 5777 401946 5775->5777 5776->5777 5778 401964 LocalAlloc 5777->5778 5779 40197e 5778->5779 5780 4019c3 RtlLeaveCriticalSection 5779->5780 5781 4019cd 5779->5781 5780->5781 5781->5766 5783 401ef0 5782->5783 5784 401f1c 5783->5784 5787 401f40 5783->5787 5788 401e58 5783->5788 5784->5787 5793 401d00 5784->5793 5787->5773 5787->5774 5797 4016d8 5788->5797 5791 401e75 5791->5783 5794 401d4e 5793->5794 5795 401d1e 5793->5795 5794->5795 5866 401c68 5794->5866 5795->5787 5798 4016f4 5797->5798 5800 4016fe 5798->5800 5802 40175b 5798->5802 5804 40174f 5798->5804 5814 401430 5798->5814 5826 40132c 5798->5826 5822 4015c4 5800->5822 5802->5791 5807 401dcc 5802->5807 5830 40150c 5804->5830 5805 40170a 5805->5802 5840 401d80 5807->5840 5810 40132c LocalAlloc 5811 401df0 5810->5811 5812 401df8 5811->5812 5844 401b44 5811->5844 5812->5791 5815 40143f VirtualAlloc 5814->5815 5817 40146c 5815->5817 5818 40148f 5815->5818 5834 4012e4 5817->5834 5818->5798 5821 40147c VirtualFree 5821->5818 5823 40160a 5822->5823 5824 401626 VirtualAlloc 5823->5824 5825 40163a 5823->5825 5824->5823 5824->5825 5825->5805 5827 401348 5826->5827 5828 4012e4 LocalAlloc 5827->5828 5829 40138f 5828->5829 5829->5798 5833 40153b 5830->5833 5831 401594 5831->5802 5832 401568 VirtualFree 5832->5833 5833->5831 5833->5832 5837 40128c 5834->5837 5838 401298 LocalAlloc 5837->5838 5839 4012aa 5837->5839 5838->5839 5839->5818 5839->5821 5841 401d92 5840->5841 5842 401d89 5840->5842 5841->5810 5842->5841 5849 401b74 5842->5849 5845 401b61 5844->5845 5846 401b52 5844->5846 5845->5812 5847 401d00 9 API calls 5846->5847 5848 401b5f 5847->5848 5848->5812 5852 40215c 5849->5852 5851 401b95 5851->5841 5853 402175 5852->5853 5857 40217a 5852->5857 5855 401918 4 API calls 5853->5855 5854 4021ab RtlEnterCriticalSection 5858 4021b5 5854->5858 5855->5857 5856 4021c1 5860 4022e3 RtlLeaveCriticalSection 5856->5860 5861 4022ed 5856->5861 5857->5854 5857->5858 5862 40217e 5857->5862 5858->5856 5859 402244 5858->5859 5864 402270 5858->5864 5859->5862 5863 401d80 7 API calls 5859->5863 5860->5861 5861->5851 5862->5851 5863->5862 5864->5856 5865 401d00 7 API calls 5864->5865 5865->5856 5867 401c7a 5866->5867 5868 401c9d 5867->5868 5869 401caf 5867->5869 5879 40188c 5868->5879 5871 40188c 3 API calls 5869->5871 5872 401cad 5871->5872 5873 401b44 9 API calls 5872->5873 5878 401cc5 5872->5878 5874 401cd4 5873->5874 5875 401cee 5874->5875 5889 401b98 5874->5889 5894 4013a0 5875->5894 5878->5795 5880 4018b2 5879->5880 5881 40190b 5879->5881 5898 401658 5880->5898 5881->5872 5884 40132c LocalAlloc 5885 4018cf 5884->5885 5886 4018e6 5885->5886 5887 40150c VirtualFree 5885->5887 5886->5881 5888 4013a0 LocalAlloc 5886->5888 5887->5886 5888->5881 5890 401bab 5889->5890 5891 401b9d 5889->5891 5890->5875 5892 401b74 9 API calls 5891->5892 5893 401baa 5892->5893 5893->5875 5895 4013ab 5894->5895 5896 4013c6 5895->5896 5897 4012e4 LocalAlloc 5895->5897 5896->5878 5897->5896 5900 40168f 5898->5900 5899 4016cf 5899->5884 5900->5899 5901 4016a9 VirtualFree 5900->5901 5901->5900 6858 402dfa 6859 402e26 6858->6859 6860 402e0d 6858->6860 6862 402ba4 6860->6862 6863 402bc9 6862->6863 6864 402bad 6862->6864 6863->6859 6865 402bb5 RaiseException 6864->6865 6865->6863 6866 4075fa GetFileSize 6867 407626 6866->6867 6868 407616 GetLastError 6866->6868 6868->6867 6869 40761f 6868->6869 6870 40748c 35 API calls 6869->6870 6870->6867 6871 406ffb 6872 407008 SetErrorMode 6871->6872 6540 403a80 CloseHandle 6541 403a90 6540->6541 6542 403a91 GetLastError 6540->6542 6543 404283 6544 4042c3 6543->6544 6545 403154 4 API calls 6544->6545 6546 404323 6545->6546 6873 404185 6874 4041ff 6873->6874 6875 4041cc 6874->6875 6876 403154 4 API calls 6874->6876 6877 404323 6876->6877 6547 403e87 6548 403e4c 6547->6548 6549 403e67 6548->6549 6550 403e62 6548->6550 6551 403e7b 6548->6551 6554 403e78 6549->6554 6560 402674 6549->6560 6556 403cc8 6550->6556 6553 402674 4 API calls 6551->6553 6553->6554 6557 403cd6 6556->6557 6558 402674 4 API calls 6557->6558 6559 403ceb 6557->6559 6558->6559 6559->6549 6561 403154 4 API calls 6560->6561 6562 40267a 6561->6562 6562->6554 6571 407e90 6572 407eb8 VirtualFree 6571->6572 6573 407e9d 6572->6573 6576 403e95 6577 403e4c 6576->6577 6578 403e67 6577->6578 6579 403e62 6577->6579 6580 403e7b 6577->6580 6583 403e78 6578->6583 6584 402674 4 API calls 6578->6584 6581 403cc8 4 API calls 6579->6581 6582 402674 4 API calls 6580->6582 6581->6578 6582->6583 6584->6583 6585 40ac97 6594 4096fc 6585->6594 6588 402f24 5 API calls 6589 40aca1 6588->6589 6590 403198 4 API calls 6589->6590 6591 40acc0 6590->6591 6592 403198 4 API calls 6591->6592 6593 40acc8 6592->6593 6603 4056ac 6594->6603 6596 409717 6597 409745 6596->6597 6609 40720c 6596->6609 6600 403198 4 API calls 6597->6600 6599 409735 6602 40973d MessageBoxA 6599->6602 6601 40975a 6600->6601 6601->6588 6601->6589 6602->6597 6604 403154 4 API calls 6603->6604 6605 4056b1 6604->6605 6606 4056c9 6605->6606 6607 403154 4 API calls 6605->6607 6606->6596 6608 4056bf 6607->6608 6608->6596 6610 4056ac 4 API calls 6609->6610 6611 40721b 6610->6611 6612 407221 6611->6612 6613 40722f 6611->6613 6614 40322c 4 API calls 6612->6614 6615 40723f 6613->6615 6617 40724b 6613->6617 6618 40722d 6614->6618 6620 4071d0 6615->6620 6627 4032b8 6617->6627 6618->6599 6621 40322c 4 API calls 6620->6621 6622 4071df 6621->6622 6623 4071fc 6622->6623 6624 406950 CharPrevA 6622->6624 6623->6618 6625 4071eb 6624->6625 6625->6623 6626 4032fc 18 API calls 6625->6626 6626->6623 6628 403278 18 API calls 6627->6628 6629 4032c2 6628->6629 6629->6618 6630 403a97 6631 403aac 6630->6631 6632 403bbc GetStdHandle 6631->6632 6633 403b0e CreateFileA 6631->6633 6641 403ab2 6631->6641 6634 403c17 GetLastError 6632->6634 6638 403bba 6632->6638 6633->6634 6635 403b2c 6633->6635 6634->6641 6637 403b3b GetFileSize 6635->6637 6635->6638 6637->6634 6639 403b4e SetFilePointer 6637->6639 6640 403be7 GetFileType 6638->6640 6638->6641 6639->6634 6644 403b6a ReadFile 6639->6644 6640->6641 6643 403c02 CloseHandle 6640->6643 6643->6641 6644->6634 6645 403b8c 6644->6645 6645->6638 6646 403b9f SetFilePointer 6645->6646 6646->6634 6647 403bb0 SetEndOfFile 6646->6647 6647->6634 6647->6638 6652 40aaa2 6653 40aad2 6652->6653 6654 40aadc CreateWindowExA SetWindowLongA 6653->6654 6655 405194 33 API calls 6654->6655 6656 40ab5f 6655->6656 6657 4032fc 18 API calls 6656->6657 6658 40ab6d 6657->6658 6659 4032fc 18 API calls 6658->6659 6660 40ab7a 6659->6660 6661 406b7c 19 API calls 6660->6661 6662 40ab86 6661->6662 6663 4032fc 18 API calls 6662->6663 6664 40ab8f 6663->6664 6665 4099ec 43 API calls 6664->6665 6666 40aba1 6665->6666 6667 4098cc 19 API calls 6666->6667 6668 40abb4 6666->6668 6667->6668 6669 40abed 6668->6669 6670 4094d8 9 API calls 6668->6670 6671 40ac06 6669->6671 6674 40ac00 RemoveDirectoryA 6669->6674 6670->6669 6672 40ac1a 6671->6672 6673 40ac0f DestroyWindow 6671->6673 6675 40ac42 6672->6675 6676 40357c 4 API calls 6672->6676 6673->6672 6674->6671 6677 40ac38 6676->6677 6678 4025ac 4 API calls 6677->6678 6678->6675 6890 405ba2 6892 405ba4 6890->6892 6891 405be0 6894 405940 19 API calls 6891->6894 6892->6891 6893 405bda 6892->6893 6895 405bf7 6892->6895 6893->6891 6896 405c4c 6893->6896 6897 405bf3 6894->6897 6899 404cdc 19 API calls 6895->6899 6898 4059b0 33 API calls 6896->6898 6900 403198 4 API calls 6897->6900 6898->6897 6901 405c20 6899->6901 6902 405c86 6900->6902 6903 4059b0 33 API calls 6901->6903 6903->6897 6904 408da4 6905 408dc8 6904->6905 6906 408c80 18 API calls 6905->6906 6907 408dd1 6906->6907 6679 402caa 6680 403154 4 API calls 6679->6680 6681 402caf 6680->6681 6922 4011aa 6923 4011ac GetStdHandle 6922->6923 6682 4028ac 6683 402594 18 API calls 6682->6683 6684 4028b6 6683->6684 4994 40aab4 4995 40aab8 SetLastError 4994->4995 5026 409648 GetLastError 4995->5026 4998 40aad2 5000 40aadc CreateWindowExA SetWindowLongA 4998->5000 5039 405194 5000->5039 5004 40ab6d 5005 4032fc 18 API calls 5004->5005 5006 40ab7a 5005->5006 5056 406b7c GetCommandLineA 5006->5056 5009 4032fc 18 API calls 5010 40ab8f 5009->5010 5061 4099ec 5010->5061 5012 40aba1 5014 40abb4 5012->5014 5082 4098cc 5012->5082 5015 40abd4 5014->5015 5016 40abed 5014->5016 5088 4094d8 5015->5088 5018 40ac06 5016->5018 5021 40ac00 RemoveDirectoryA 5016->5021 5019 40ac1a 5018->5019 5020 40ac0f DestroyWindow 5018->5020 5022 40ac42 5019->5022 5096 40357c 5019->5096 5020->5019 5021->5018 5024 40ac38 5109 4025ac 5024->5109 5113 404c94 5026->5113 5034 4096c3 5128 4031b8 5034->5128 5040 4051a8 33 API calls 5039->5040 5041 4051a3 5040->5041 5042 4032fc 5041->5042 5043 403300 5042->5043 5044 40333f 5042->5044 5045 4031e8 5043->5045 5046 40330a 5043->5046 5044->5004 5049 4031fc 5045->5049 5053 403254 18 API calls 5045->5053 5047 403334 5046->5047 5048 40331d 5046->5048 5052 4034f0 18 API calls 5047->5052 5289 4034f0 5048->5289 5050 403228 5049->5050 5054 4025ac 4 API calls 5049->5054 5050->5004 5055 403322 5052->5055 5053->5049 5054->5050 5055->5004 5315 406af0 5056->5315 5058 406ba1 5059 403198 4 API calls 5058->5059 5060 406bbf 5059->5060 5060->5009 5329 4033b4 5061->5329 5063 409a27 5064 409a59 CreateProcessA 5063->5064 5065 409a65 5064->5065 5066 409a6c CloseHandle 5064->5066 5067 409648 35 API calls 5065->5067 5068 409a75 5066->5068 5067->5066 5069 4099c0 TranslateMessage DispatchMessageA PeekMessageA 5068->5069 5070 409a7a MsgWaitForMultipleObjects 5069->5070 5070->5068 5071 409a91 5070->5071 5072 4099c0 TranslateMessage DispatchMessageA PeekMessageA 5071->5072 5073 409a96 GetExitCodeProcess CloseHandle 5072->5073 5074 409ab6 5073->5074 5075 403198 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5074->5075 5076 409abe 5075->5076 5076->5012 5077 402f24 5078 403154 4 API calls 5077->5078 5079 402f29 5078->5079 5335 402bcc 5079->5335 5081 402f51 5081->5081 5083 40990e 5082->5083 5084 4098d4 5082->5084 5083->5014 5084->5083 5085 403420 18 API calls 5084->5085 5086 409908 5085->5086 5338 408e80 5086->5338 5089 409532 5088->5089 5093 4094eb 5088->5093 5089->5016 5090 4094f3 Sleep 5090->5093 5091 409503 Sleep 5091->5093 5093->5089 5093->5090 5093->5091 5094 40951a GetLastError 5093->5094 5361 408fbc 5093->5361 5094->5089 5095 409524 GetLastError 5094->5095 5095->5089 5095->5093 5097 403591 5096->5097 5098 4035a0 5096->5098 5101 4035d0 5097->5101 5102 40359b 5097->5102 5106 4035b6 5097->5106 5099 4035b1 5098->5099 5100 4035b8 5098->5100 5103 403198 4 API calls 5099->5103 5104 4031b8 4 API calls 5100->5104 5101->5106 5107 40357c 4 API calls 5101->5107 5102->5098 5105 4035ec 5102->5105 5103->5106 5104->5106 5105->5106 5378 403554 5105->5378 5106->5024 5107->5101 5110 4025b0 5109->5110 5111 4025ba 5109->5111 5110->5111 5112 403154 4 API calls 5110->5112 5111->5022 5111->5111 5112->5111 5136 4051a8 5113->5136 5116 407284 FormatMessageA 5117 4072aa 5116->5117 5118 403278 18 API calls 5117->5118 5119 4072c7 5118->5119 5120 408da8 5119->5120 5121 408dc8 5120->5121 5279 408c80 5121->5279 5124 405890 5125 405897 5124->5125 5126 4031e8 18 API calls 5125->5126 5127 4058af 5126->5127 5127->5034 5130 4031be 5128->5130 5129 4031e3 5132 403198 5129->5132 5130->5129 5131 4025ac 4 API calls 5130->5131 5131->5130 5133 4031b7 5132->5133 5134 40319e 5132->5134 5133->4998 5133->5077 5134->5133 5135 4025ac 4 API calls 5134->5135 5135->5133 5137 4051c5 5136->5137 5144 404e58 5137->5144 5140 4051f1 5149 403278 5140->5149 5146 404e73 5144->5146 5145 404e85 5145->5140 5154 404be4 5145->5154 5146->5145 5157 404f7a 5146->5157 5164 404e4c 5146->5164 5150 403254 18 API calls 5149->5150 5151 403288 5150->5151 5152 403198 4 API calls 5151->5152 5153 4032a0 5152->5153 5153->5116 5271 405940 5154->5271 5156 404bf5 5156->5140 5158 404f8b 5157->5158 5161 404fd9 5157->5161 5160 40505f 5158->5160 5158->5161 5163 404ff7 5160->5163 5171 404e38 5160->5171 5161->5163 5167 404df4 5161->5167 5163->5146 5163->5163 5165 403198 4 API calls 5164->5165 5166 404e56 5165->5166 5166->5146 5168 404e02 5167->5168 5174 404bfc 5168->5174 5170 404e30 5170->5161 5201 4039a4 5171->5201 5177 4059b0 5174->5177 5176 404c15 5176->5170 5178 4059be 5177->5178 5187 404cdc LoadStringA 5178->5187 5181 405194 33 API calls 5182 4059f6 5181->5182 5190 4031e8 5182->5190 5185 4031b8 4 API calls 5186 405a1b 5185->5186 5186->5176 5188 403278 18 API calls 5187->5188 5189 404d09 5188->5189 5189->5181 5191 4031ec 5190->5191 5192 4031fc 5190->5192 5191->5192 5196 403254 5191->5196 5193 403228 5192->5193 5195 4025ac 4 API calls 5192->5195 5193->5185 5195->5193 5197 403274 5196->5197 5198 403258 5196->5198 5197->5192 5199 402594 18 API calls 5198->5199 5200 403261 5199->5200 5200->5192 5202 4039ab 5201->5202 5207 4038b4 5202->5207 5204 4039cb 5205 403198 4 API calls 5204->5205 5206 4039d2 5205->5206 5206->5163 5208 4038d5 5207->5208 5209 4038c8 5207->5209 5210 403934 5208->5210 5211 4038db 5208->5211 5235 403780 5209->5235 5215 403993 5210->5215 5216 40393b 5210->5216 5213 4038e1 5211->5213 5214 4038ee 5211->5214 5242 403894 5213->5242 5219 403894 6 API calls 5214->5219 5220 4037f4 3 API calls 5215->5220 5221 403941 5216->5221 5222 40394b 5216->5222 5217 4038d0 5217->5204 5225 4038fc 5219->5225 5220->5217 5257 403864 5221->5257 5224 4037f4 3 API calls 5222->5224 5226 40395d 5224->5226 5247 4037f4 5225->5247 5228 403864 23 API calls 5226->5228 5230 403976 5228->5230 5229 403917 5253 40374c 5229->5253 5232 40374c VariantClear 5230->5232 5234 40398b 5232->5234 5233 40392c 5233->5204 5234->5204 5236 4037f0 5235->5236 5237 403744 5235->5237 5236->5217 5237->5235 5238 403793 VariantClear 5237->5238 5239 403198 4 API calls 5237->5239 5240 4037dc VariantCopyInd 5237->5240 5241 4037ab 5237->5241 5238->5237 5239->5237 5240->5236 5240->5237 5241->5217 5262 4036b8 5242->5262 5245 40374c VariantClear 5246 4038a9 5245->5246 5246->5217 5248 403845 VariantChangeTypeEx 5247->5248 5249 40380a VariantChangeTypeEx 5247->5249 5252 403832 5248->5252 5250 403826 5249->5250 5251 40374c VariantClear 5250->5251 5251->5252 5252->5229 5254 403759 5253->5254 5255 403766 5253->5255 5254->5255 5256 403779 VariantClear 5254->5256 5255->5233 5256->5233 5268 40369c SysStringLen 5257->5268 5260 40374c VariantClear 5261 403882 5260->5261 5261->5217 5263 4036cb 5262->5263 5264 403706 MultiByteToWideChar SysAllocStringLen MultiByteToWideChar 5263->5264 5265 4036db 5263->5265 5266 40372e 5264->5266 5267 4036ed MultiByteToWideChar SysAllocStringLen 5265->5267 5266->5245 5267->5266 5269 403610 21 API calls 5268->5269 5270 4036b3 5269->5270 5270->5260 5272 40594c 5271->5272 5273 404cdc 19 API calls 5272->5273 5274 405972 5273->5274 5275 4031e8 18 API calls 5274->5275 5276 40597d 5275->5276 5277 403198 4 API calls 5276->5277 5278 405992 5277->5278 5278->5156 5280 403198 4 API calls 5279->5280 5288 408cb1 5279->5288 5280->5288 5281 4031b8 4 API calls 5282 408d69 5281->5282 5282->5124 5283 403278 18 API calls 5283->5288 5284 408cc8 5285 4032fc 18 API calls 5284->5285 5287 408cdc 5285->5287 5286 4032fc 18 API calls 5286->5288 5287->5281 5288->5283 5288->5284 5288->5286 5288->5287 5290 4034fd 5289->5290 5297 40352d 5289->5297 5292 403526 5290->5292 5294 403509 5290->5294 5291 403198 4 API calls 5293 403517 5291->5293 5295 403254 18 API calls 5292->5295 5293->5055 5298 4025c4 5294->5298 5295->5297 5297->5291 5299 4025ca 5298->5299 5300 4025dc 5299->5300 5302 403154 5299->5302 5300->5293 5300->5300 5303 403164 5302->5303 5304 40318c TlsGetValue 5302->5304 5303->5300 5305 403196 5304->5305 5306 40316f 5304->5306 5305->5300 5310 40310c 5306->5310 5308 403174 TlsGetValue 5309 403184 5308->5309 5309->5300 5311 403120 LocalAlloc 5310->5311 5313 403116 5310->5313 5312 40313e TlsSetValue 5311->5312 5314 403132 5311->5314 5312->5314 5313->5311 5314->5308 5316 406b1c 5315->5316 5317 403278 18 API calls 5316->5317 5318 406b29 5317->5318 5325 403420 5318->5325 5320 406b31 5321 4031e8 18 API calls 5320->5321 5322 406b49 5321->5322 5323 403198 4 API calls 5322->5323 5324 406b6b 5323->5324 5324->5058 5326 403426 5325->5326 5328 403437 5325->5328 5327 403254 18 API calls 5326->5327 5326->5328 5327->5328 5328->5320 5330 4033bc 5329->5330 5331 403254 18 API calls 5330->5331 5332 4033cf 5331->5332 5333 4031e8 18 API calls 5332->5333 5334 4033f7 5333->5334 5336 402bd5 RaiseException 5335->5336 5337 402be6 5335->5337 5336->5337 5337->5081 5339 408e8e 5338->5339 5341 408ea6 5339->5341 5351 408e18 5339->5351 5342 408e18 18 API calls 5341->5342 5343 408eca 5341->5343 5342->5343 5354 407918 5343->5354 5345 408ee5 5346 408e18 18 API calls 5345->5346 5348 408ef8 5345->5348 5346->5348 5347 408e18 18 API calls 5347->5348 5348->5347 5349 403278 18 API calls 5348->5349 5350 408f27 5348->5350 5349->5348 5350->5083 5352 405890 18 API calls 5351->5352 5353 408e29 5352->5353 5353->5341 5357 4078c4 5354->5357 5358 4078d6 5357->5358 5359 4078e7 5357->5359 5360 4078db InterlockedExchange 5358->5360 5359->5345 5360->5359 5369 408f70 5361->5369 5363 408fd2 5364 408fd6 5363->5364 5365 408ff2 DeleteFileA GetLastError 5363->5365 5364->5093 5366 409010 5365->5366 5375 408fac 5366->5375 5370 408f7a 5369->5370 5371 408f7e 5369->5371 5370->5363 5372 408fa0 SetLastError 5371->5372 5373 408f87 Wow64DisableWow64FsRedirection 5371->5373 5374 408f9b 5372->5374 5373->5374 5374->5363 5376 408fb1 Wow64RevertWow64FsRedirection 5375->5376 5377 408fbb 5375->5377 5376->5377 5377->5093 5379 403566 5378->5379 5381 403578 5379->5381 5382 403604 5379->5382 5381->5105 5383 40357c 5382->5383 5384 4035a0 5383->5384 5387 4035d0 5383->5387 5388 40359b 5383->5388 5392 4035b6 5383->5392 5385 4035b1 5384->5385 5386 4035b8 5384->5386 5389 403198 4 API calls 5385->5389 5390 4031b8 4 API calls 5386->5390 5387->5392 5393 40357c 4 API calls 5387->5393 5388->5384 5391 4035ec 5388->5391 5389->5392 5390->5392 5391->5392 5394 403554 4 API calls 5391->5394 5392->5379 5393->5387 5394->5391 6685 401ab9 6686 401a96 6685->6686 6687 401aa9 RtlDeleteCriticalSection 6686->6687 6688 401a9f RtlLeaveCriticalSection 6686->6688 6688->6687

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 116 409b78-409b9c GetSystemInfo VirtualQuery 117 409ba2 116->117 118 409c2c-409c33 116->118 119 409c21-409c26 117->119 119->118 120 409ba4-409bab 119->120 121 409c0d-409c1f VirtualQuery 120->121 122 409bad-409bb1 120->122 121->118 121->119 122->121 123 409bb3-409bbb 122->123 124 409bcc-409bdd VirtualProtect 123->124 125 409bbd-409bc0 123->125 127 409be1-409be3 124->127 128 409bdf 124->128 125->124 126 409bc2-409bc5 125->126 126->124 129 409bc7-409bca 126->129 130 409bf2-409bf5 127->130 128->127 129->124 129->127 131 409be5-409bee call 409b70 130->131 132 409bf7-409bf9 130->132 131->130 132->121 134 409bfb-409c08 VirtualProtect 132->134 134->121
                                                                                              APIs
                                                                                              • GetSystemInfo.KERNEL32(?), ref: 00409B8A
                                                                                              • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 00409B95
                                                                                              • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 00409BD6
                                                                                              • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 00409C08
                                                                                              • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 00409C18
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Virtual$ProtectQuery$InfoSystem
                                                                                              • String ID:
                                                                                              • API String ID: 2441996862-0
                                                                                              • Opcode ID: 69cc1b0b9b744b29044eea84e4744ba7a66f7205e02ae19cc0529fdcfa929845
                                                                                              • Instruction ID: 4a1d84bb43d4a47cf168f169447d483ed62c711ee8ccb48f5bfbfd053dbeaed9
                                                                                              • Opcode Fuzzy Hash: 69cc1b0b9b744b29044eea84e4744ba7a66f7205e02ae19cc0529fdcfa929845
                                                                                              • Instruction Fuzzy Hash: D421A1B16043006BDA309AA99C85E57B7E8AF45360F144C2BFA99E72C3D239FC40C669
                                                                                              APIs
                                                                                              • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: InfoLocale
                                                                                              • String ID:
                                                                                              • API String ID: 2299586839-0
                                                                                              • Opcode ID: 08facca5f8c818d7ae0117448837c5e97f15c9e55cb3aedc2694e0bc5091a832
                                                                                              • Instruction ID: 1248db9972fbf410c55bf070b604c98f5d62b90992f8f49b6b6440a9954d2c50
                                                                                              • Opcode Fuzzy Hash: 08facca5f8c818d7ae0117448837c5e97f15c9e55cb3aedc2694e0bc5091a832
                                                                                              • Instruction Fuzzy Hash: E2E0927170021427D710A9A99C86AEB725CEB58310F0002BFB904E73C6EDB49E804AED

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,?,0040A618), ref: 00404582
                                                                                              • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040458F
                                                                                              • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 004045A5
                                                                                              • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 004045BB
                                                                                              • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,0040A618), ref: 004045C6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$HandleModulePolicyProcess
                                                                                              • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                                                              • API String ID: 3256987805-3653653586
                                                                                              • Opcode ID: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                                                              • Instruction ID: 1f393095ee8ecda9e1e01b6ca7d440447e938bbc9796bcd5dbe8d266940e5f64
                                                                                              • Opcode Fuzzy Hash: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                                                              • Instruction Fuzzy Hash: 5FE02DD03813013AEA5032F20D83B2B20884AD0B49B2414377F25B61C3EDBDDA40587E

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • SetLastError.KERNEL32 ref: 0040AAC1
                                                                                                • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B244,?,020A24BC), ref: 0040966C
                                                                                              • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AAFE
                                                                                              • SetWindowLongA.USER32(000204A8,000000FC,00409960), ref: 0040AB15
                                                                                              • RemoveDirectoryA.KERNEL32(00000000,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC01
                                                                                              • DestroyWindow.USER32(000204A8,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC15
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$ErrorLast$CreateDestroyDirectoryLongRemove
                                                                                              • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                                              • API String ID: 3757039580-3001827809
                                                                                              • Opcode ID: 7bc9c0c8e9dfd2478b94306391eafe1fb51b7566d8199cdbb2b2653dcbc3d95c
                                                                                              • Instruction ID: 81987b3bab642c92fe87a7372e0454594c4b8fe140ce311e0f93b1eeebf6ab37
                                                                                              • Opcode Fuzzy Hash: 7bc9c0c8e9dfd2478b94306391eafe1fb51b7566d8199cdbb2b2653dcbc3d95c
                                                                                              • Instruction Fuzzy Hash: 25412E70604204DBDB10EBA9EE89B9E37A5EB44304F10467FF510B72E2D7B89855CB9D

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,0040A62C), ref: 004090C4
                                                                                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090CA
                                                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,0040A62C), ref: 004090DE
                                                                                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090E4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressHandleModuleProc
                                                                                              • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                                              • API String ID: 1646373207-2130885113
                                                                                              • Opcode ID: 0414f1d66f28dc470df4633e5994336701384173b3f6f66b470f3ad827f759f7
                                                                                              • Instruction ID: 214dda5481ef482ebe311b1329301f35405b1013d97e3062c17ffb2c8286d57d
                                                                                              • Opcode Fuzzy Hash: 0414f1d66f28dc470df4633e5994336701384173b3f6f66b470f3ad827f759f7
                                                                                              • Instruction Fuzzy Hash: 21017C70748342AEFB00BB76DD4AB163A68E785704F60457BF640BA2D3DABD4C04D66E

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AAFE
                                                                                              • SetWindowLongA.USER32(000204A8,000000FC,00409960), ref: 0040AB15
                                                                                                • Part of subcall function 00406B7C: GetCommandLineA.KERNEL32(00000000,00406BC0,?,?,?,?,00000000,?,0040AB86,?), ref: 00406B94
                                                                                                • Part of subcall function 004099EC: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020A24BC,00409AD8,00000000,00409ABF), ref: 00409A5C
                                                                                                • Part of subcall function 004099EC: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020A24BC,00409AD8,00000000), ref: 00409A70
                                                                                                • Part of subcall function 004099EC: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A89
                                                                                                • Part of subcall function 004099EC: GetExitCodeProcess.KERNEL32(?,0040B244), ref: 00409A9B
                                                                                                • Part of subcall function 004099EC: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020A24BC,00409AD8), ref: 00409AA4
                                                                                              • RemoveDirectoryA.KERNEL32(00000000,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC01
                                                                                              • DestroyWindow.USER32(000204A8,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC15
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$CloseCreateHandleProcess$CodeCommandDestroyDirectoryExitLineLongMultipleObjectsRemoveWait
                                                                                              • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                                              • API String ID: 3586484885-3001827809
                                                                                              • Opcode ID: c367800830601d7b7bb1e4b9cc729c69669d466ec6c890b8506752b9ad64910a
                                                                                              • Instruction ID: d3376fcde1141b4290a3dca450fc2844fa47922897975e075ebf06e3b6db64eb
                                                                                              • Opcode Fuzzy Hash: c367800830601d7b7bb1e4b9cc729c69669d466ec6c890b8506752b9ad64910a
                                                                                              • Instruction Fuzzy Hash: 77411A71604204DFD714EBA9EE85B5A37B5EB48304F20427BF500BB2E1D7B8A855CB9D

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020A24BC,00409AD8,00000000,00409ABF), ref: 00409A5C
                                                                                              • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020A24BC,00409AD8,00000000), ref: 00409A70
                                                                                              • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A89
                                                                                              • GetExitCodeProcess.KERNEL32(?,0040B244), ref: 00409A9B
                                                                                              • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020A24BC,00409AD8), ref: 00409AA4
                                                                                                • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B244,?,020A24BC), ref: 0040966C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                                                                                              • String ID: D
                                                                                              • API String ID: 3356880605-2746444292
                                                                                              • Opcode ID: aadf6f075de5bdb3c28d757ddccd10dd30f6bbfdbbad62eb54c24073370c977f
                                                                                              • Instruction ID: b58d0f6e2b8975977e6c7b71aada5392bea55c03070ce9fad3dcef5aa6d4018a
                                                                                              • Opcode Fuzzy Hash: aadf6f075de5bdb3c28d757ddccd10dd30f6bbfdbbad62eb54c24073370c977f
                                                                                              • Instruction Fuzzy Hash: EE1142B16402486EDB00EBE6CC42F9EB7ACEF49714F50013BB604F72C6DA785D048A69

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 136 401918-40193a RtlInitializeCriticalSection 137 401946-40197c call 4012dc * 3 LocalAlloc 136->137 138 40193c-401941 RtlEnterCriticalSection 136->138 145 4019ad-4019c1 137->145 146 40197e 137->146 138->137 150 4019c3-4019c8 RtlLeaveCriticalSection 145->150 151 4019cd 145->151 147 401983-401995 146->147 147->147 149 401997-4019a6 147->149 149->145 150->151
                                                                                              APIs
                                                                                              • RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                                                              • RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                                                              • LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                                                              • RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                                              • String ID:
                                                                                              • API String ID: 730355536-0
                                                                                              • Opcode ID: 38709c719971e1168baf9cdc3c67f999ad3db3ab521e9349fb3b390a12b3c6f3
                                                                                              • Instruction ID: 093a8b970c40f4dda7bd37408b901a2e20e4e29fb74a5496b56404d4d89a3717
                                                                                              • Opcode Fuzzy Hash: 38709c719971e1168baf9cdc3c67f999ad3db3ab521e9349fb3b390a12b3c6f3
                                                                                              • Instruction Fuzzy Hash: CC0161B0684240DEE715ABA999E6B353AA4E786744F10427FF080F62F2C67C4450CB9D

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040A878
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Message
                                                                                              • String ID: .tmp$y@
                                                                                              • API String ID: 2030045667-2396523267
                                                                                              • Opcode ID: 55a53fbd7ad7285035f8ab2cde1915fb146aa3dc543cd9b52406218d685c1c98
                                                                                              • Instruction ID: 5e9257013af3d55ef2b6e359c41f87f67318ae2a4e6dbf07461b5d8c6de74657
                                                                                              • Opcode Fuzzy Hash: 55a53fbd7ad7285035f8ab2cde1915fb146aa3dc543cd9b52406218d685c1c98
                                                                                              • Instruction Fuzzy Hash: 3B41C030704200CFD311EF25DED1A1A77A5EB49304B214A3AF804B73E1CAB9AC11CBAD

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040A878
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Message
                                                                                              • String ID: .tmp$y@
                                                                                              • API String ID: 2030045667-2396523267
                                                                                              • Opcode ID: 4e131503fe38447772e4e2294cf5373b7e2007f9fac8d76d0a71823c743fc64d
                                                                                              • Instruction ID: 95bba075cf9db07042691c1556ef0613dbe482a65a3614fff4d0ead14828e6f7
                                                                                              • Opcode Fuzzy Hash: 4e131503fe38447772e4e2294cf5373b7e2007f9fac8d76d0a71823c743fc64d
                                                                                              • Instruction Fuzzy Hash: E341BE30700200DFC711EF65DED2A1A77A5EB49304B104A3AF804B73E2CAB9AC01CBAD

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00409376
                                                                                              • GetLastError.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040937F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateDirectoryErrorLast
                                                                                              • String ID: .tmp
                                                                                              • API String ID: 1375471231-2986845003
                                                                                              • Opcode ID: 1c7982c9535877cc809d76a2290e1ec991a7408e90ad789d49a53b04ffd62ed2
                                                                                              • Instruction ID: b240cf9bc22f775501a2d99da134be40bb2f76fb21a7d6e050461713caae6e8b
                                                                                              • Opcode Fuzzy Hash: 1c7982c9535877cc809d76a2290e1ec991a7408e90ad789d49a53b04ffd62ed2
                                                                                              • Instruction Fuzzy Hash: 9E216774A00208ABDB05EFA1C8429DFB7B8EF88304F50457BE901B73C2DA3C9E058A65

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 342 407749-40774a 343 4076dc-4076e6 WriteFile 342->343 344 40774c-40776f 342->344 345 4076e8-4076ea call 40748c 343->345 346 4076ef-4076f2 343->346 347 407770-407785 344->347 345->346 349 407700-407704 346->349 350 4076f4-4076fb call 4073ec 346->350 351 407787 347->351 352 4077f9 347->352 350->349 354 40778a-40778f 351->354 355 4077fd-407802 351->355 356 40783b-40783d 352->356 357 4077fb 352->357 359 407803-407819 354->359 361 407791-407792 354->361 355->359 360 407841-407843 356->360 357->355 362 40785b-40785c 359->362 370 40781b 359->370 360->362 363 407724-407741 361->363 364 407794-4077b4 361->364 366 4078d6-4078eb call 407890 InterlockedExchange 362->366 367 40785e-40788c 362->367 369 4077b5 363->369 372 407743 363->372 364->369 387 407912-407917 366->387 388 4078ed-407910 366->388 380 407820-407823 367->380 381 407890-407893 367->381 374 4077b6-4077b7 369->374 375 4077f7-4077f8 369->375 376 40781e-40781f 370->376 378 407746-407747 372->378 379 4077b9 372->379 374->379 375->352 376->380 378->342 382 4077bb-4077cd 378->382 379->382 384 407898 380->384 385 407824 380->385 381->384 382->360 386 4077cf-4077d4 382->386 389 40789a 384->389 385->389 390 407825 385->390 386->356 395 4077d6-4077de 386->395 388->387 388->388 392 40789f 389->392 393 407896-407897 390->393 394 407826-40782d 390->394 396 4078a1 392->396 393->384 394->396 397 40782f 394->397 395->347 405 4077e0 395->405 399 4078a3 396->399 400 4078ac 396->400 401 407832-407833 397->401 402 4078a5-4078aa 397->402 399->402 404 4078ae-4078af 400->404 401->356 401->376 402->404 404->392 406 4078b1-4078bd 404->406 405->375 406->384 407 4078bf-4078c0 406->407
                                                                                              APIs
                                                                                              • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileWrite
                                                                                              • String ID:
                                                                                              • API String ID: 3934441357-0
                                                                                              • Opcode ID: 43d3196ec1ce5242573e8f450cfa6a0a1bc6604aabb0088ea34051851cbbaa4a
                                                                                              • Instruction ID: 20d0a63744b7af467993d3e8aec565234b7be2d060ba20bf9fd199bb98bd5a4e
                                                                                              • Opcode Fuzzy Hash: 43d3196ec1ce5242573e8f450cfa6a0a1bc6604aabb0088ea34051851cbbaa4a
                                                                                              • Instruction Fuzzy Hash: 8251D12294D2910FC7126B7849685A53FE0FE5331132E92FBC5C1AB1A3D27CA847D35B

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 408 401fd4-401fe6 409 401fe8 call 401918 408->409 410 401ffb-402010 408->410 414 401fed-401fef 409->414 412 402012-402017 RtlEnterCriticalSection 410->412 413 40201c-402025 410->413 412->413 415 402027 413->415 416 40202c-402032 413->416 414->410 417 401ff1-401ff6 414->417 415->416 418 402038-40203c 416->418 419 4020cb-4020d1 416->419 420 40214f-402158 417->420 423 402041-402050 418->423 424 40203e 418->424 421 4020d3-4020e0 419->421 422 40211d-40211f call 401ee0 419->422 425 4020e2-4020ea 421->425 426 4020ef-40211b call 402f54 421->426 432 402124-40213b 422->432 423->419 427 402052-402060 423->427 424->423 425->426 426->420 430 402062-402066 427->430 431 40207c-402080 427->431 436 402068 430->436 437 40206b-40207a 430->437 433 402082 431->433 434 402085-4020a0 431->434 440 402147 432->440 441 40213d-402142 RtlLeaveCriticalSection 432->441 433->434 439 4020a2-4020c6 call 402f54 434->439 436->437 437->439 439->420 441->440
                                                                                              APIs
                                                                                              • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00402148), ref: 00402017
                                                                                                • Part of subcall function 00401918: RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                                                                • Part of subcall function 00401918: RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                                                                • Part of subcall function 00401918: LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                                                                • Part of subcall function 00401918: RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                                                                                              • String ID:
                                                                                              • API String ID: 296031713-0
                                                                                              • Opcode ID: e41243de7c80276a36dcdd2c2c0e451bb1a6f3055e5ddec7aea90b49354f7273
                                                                                              • Instruction ID: b272be6629c35a549fc4f1c5a19e6e0df2414f51bb24a7fd7fb800939d1160d0
                                                                                              • Opcode Fuzzy Hash: e41243de7c80276a36dcdd2c2c0e451bb1a6f3055e5ddec7aea90b49354f7273
                                                                                              • Instruction Fuzzy Hash: D4419CB2A40711DFDB108F69DEC562A77A0FB58314B25837AD984B73E1D378A842CB48

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 444 406fa0-406ff3 SetErrorMode call 403414 LoadLibraryA
                                                                                              APIs
                                                                                              • SetErrorMode.KERNEL32(00008000), ref: 00406FAA
                                                                                              • LoadLibraryA.KERNEL32(00000000,00000000,00406FF4,?,00000000,00407012,?,00008000), ref: 00406FD9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLibraryLoadMode
                                                                                              • String ID:
                                                                                              • API String ID: 2987862817-0
                                                                                              • Opcode ID: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                                                              • Instruction ID: 292e1fc4e19851716b0ab93d2d43454b233f1d25ff8a05a0d03104374ea2dcbc
                                                                                              • Opcode Fuzzy Hash: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                                                              • Instruction Fuzzy Hash: D6F08270A14704BEDB129FB68C5282ABBECEB4DB0475349BAF914A26D2E53C5C209568
                                                                                              APIs
                                                                                              • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 0040768B
                                                                                              • GetLastError.KERNEL32(?,?,?,00000000), ref: 00407693
                                                                                                • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020A03AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$FilePointer
                                                                                              • String ID:
                                                                                              • API String ID: 1156039329-0
                                                                                              • Opcode ID: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                                                              • Instruction ID: 64daf3b7b2b4cd691f255a674f922558070816022eb0a012369b73df1192a31e
                                                                                              • Opcode Fuzzy Hash: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                                                              • Instruction Fuzzy Hash: B2E092766081016FD600D55EC881B9B37DCDFC5364F104536B654EB2D1D679EC108776

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 448 40762c-40764a ReadFile 449 407663-40766a 448->449 450 40764c-407650 448->450 451 407652-40765a GetLastError 450->451 452 40765c-40765e call 40748c 450->452 451->449 451->452 452->449
                                                                                              APIs
                                                                                              • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00407643
                                                                                              • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00407652
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorFileLastRead
                                                                                              • String ID:
                                                                                              • API String ID: 1948546556-0
                                                                                              • Opcode ID: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                                                              • Instruction ID: e2f452503b48da12a69c10a9d1416f2aa512a4714c212e67fea7d8588799396e
                                                                                              • Opcode Fuzzy Hash: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                                                              • Instruction Fuzzy Hash: 69E012A1A081106ADB24A66E9CC5F6B6BDCCBC5724F14457BF504DB382D678DC0487BB
                                                                                              APIs
                                                                                              • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 004075DB
                                                                                              • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 004075E7
                                                                                                • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020A03AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$FilePointer
                                                                                              • String ID:
                                                                                              • API String ID: 1156039329-0
                                                                                              • Opcode ID: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                                                              • Instruction ID: 74cf86129294d2faf5969c20f66175129728110ffa3c668ef2bae8a95e28f18b
                                                                                              • Opcode Fuzzy Hash: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                                                              • Instruction Fuzzy Hash: C4E04FB1600210AFDB10EEB98D81B9676D89F48364F0485B6EA14DF2C6D274DC00C766
                                                                                              APIs
                                                                                              • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                                                                                              • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Virtual$AllocFree
                                                                                              • String ID:
                                                                                              • API String ID: 2087232378-0
                                                                                              • Opcode ID: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                                              • Instruction ID: 29306f1da17679ce7d7d3cecb65679b0075e6f6f2ddca0a826851c871ac90975
                                                                                              • Opcode Fuzzy Hash: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                                              • Instruction Fuzzy Hash: 57F02772B0032057DB206A6A0CC1B636AC59F85B90F1541BBFA4CFF3F9D2B98C0042A9
                                                                                              APIs
                                                                                              • GetSystemDefaultLCID.KERNEL32(00000000,004053B6), ref: 0040529F
                                                                                                • Part of subcall function 00404CDC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00404CF9
                                                                                                • Part of subcall function 0040520C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: DefaultInfoLoadLocaleStringSystem
                                                                                              • String ID:
                                                                                              • API String ID: 1658689577-0
                                                                                              • Opcode ID: ef449c44a2a61a26d18614e24c7ade2666283ce56a0d8fcdc2eeed56ad2c4646
                                                                                              • Instruction ID: b95c725f163960c8622ba1b0af82130980b93a97e76f79286a035b518bc8de08
                                                                                              • Opcode Fuzzy Hash: ef449c44a2a61a26d18614e24c7ade2666283ce56a0d8fcdc2eeed56ad2c4646
                                                                                              • Instruction Fuzzy Hash: 90314F75E01509ABCB00DF95C8C19EEB379FF84304F158577E815BB286E739AE068B98
                                                                                              APIs
                                                                                              • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFile
                                                                                              • String ID:
                                                                                              • API String ID: 823142352-0
                                                                                              • Opcode ID: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                                                              • Instruction ID: d860c9bcffbd3325f9178b4d72e9b59b5a3ff3896166b15a891a1a6cde46a7a7
                                                                                              • Opcode Fuzzy Hash: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                                                              • Instruction Fuzzy Hash: 6EE06D713442082EE3409AEC6C51FA277DCD309354F008032B988DB342D5719D108BE8
                                                                                              APIs
                                                                                              • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFile
                                                                                              • String ID:
                                                                                              • API String ID: 823142352-0
                                                                                              • Opcode ID: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                                                              • Instruction ID: d44512077142226ebef1615cfdb59f208ea4aebd3ed4d24446e2b73eb7949d4a
                                                                                              • Opcode Fuzzy Hash: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                                                              • Instruction Fuzzy Hash: A7E06D713442082ED2409AEC6C51F92779C9309354F008022B988DB342D5719D108BE8
                                                                                              APIs
                                                                                              • GetFileAttributesA.KERNEL32(00000000,00000000,00406A24,?,?,?,?,00000000,?,00406A39,00406D67,00000000,00406DAC,?,?,?), ref: 00406A07
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AttributesFile
                                                                                              • String ID:
                                                                                              • API String ID: 3188754299-0
                                                                                              • Opcode ID: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                                                              • Instruction ID: ccd219c895c276d3a4f2ed408fb3af00451e62210c6f1137e8185e88dac79a2a
                                                                                              • Opcode Fuzzy Hash: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                                                              • Instruction Fuzzy Hash: A0E0ED30300304BBD301FBA6CC42E4ABBECDB8A708BA28476B400B2682D6786E108428
                                                                                              APIs
                                                                                              • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                                                                • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020A03AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorFileLastWrite
                                                                                              • String ID:
                                                                                              • API String ID: 442123175-0
                                                                                              • Opcode ID: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                                                              • Instruction ID: d11fc940c1eb4d9ab9bd5ee1403c634941755763b259216c6d34bff68e3e8731
                                                                                              • Opcode Fuzzy Hash: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                                                              • Instruction Fuzzy Hash: 6DE0ED766081106BD710A65AD880EAB67DCDFC5764F00407BF904DB291D574AC049676
                                                                                              APIs
                                                                                              • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00409127,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 004072A3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: FormatMessage
                                                                                              • String ID:
                                                                                              • API String ID: 1306739567-0
                                                                                              • Opcode ID: 7ef42d69529baecca532a801bf1eab389dc79dba057db81877db687b261eaad4
                                                                                              • Instruction ID: 7b38442d06f496379890204edef453c821f476d6c52b93f329ea0e63e965d40b
                                                                                              • Opcode Fuzzy Hash: 7ef42d69529baecca532a801bf1eab389dc79dba057db81877db687b261eaad4
                                                                                              • Instruction Fuzzy Hash: 17E0D8A0B8830136F22414544C87B77220E47C0700F10807E7700ED3C6D6BEA906815F
                                                                                              APIs
                                                                                              • SetEndOfFile.KERNEL32(?,020B8000,0040AA59,00000000), ref: 004076B3
                                                                                                • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020A03AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorFileLast
                                                                                              • String ID:
                                                                                              • API String ID: 734332943-0
                                                                                              • Opcode ID: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                                                              • Instruction ID: f788b2e916ece263959a2b362e6cc5638f15ca068e5e6b6e193a7bb405067b9b
                                                                                              • Opcode Fuzzy Hash: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                                                              • Instruction Fuzzy Hash: BEC04CA1A1410047CB40A6BE89C1A1666D85A4821530485B6B908DB297D679E8004666
                                                                                              APIs
                                                                                              • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorMode
                                                                                              • String ID:
                                                                                              • API String ID: 2340568224-0
                                                                                              • Opcode ID: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                                                              • Instruction ID: c47f2f618e2971e07f5b1abb1c43dc6c143ad8b034d1ddbdae76011a93498253
                                                                                              • Opcode Fuzzy Hash: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                                                              • Instruction Fuzzy Hash: 54B09B76A1C2415DE705DAD5745153863D4D7C47143A14977F104D35C0D53DA4144519
                                                                                              APIs
                                                                                              • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorMode
                                                                                              • String ID:
                                                                                              • API String ID: 2340568224-0
                                                                                              • Opcode ID: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                                                              • Instruction ID: a55afa0689d716a84ca499c05243e055e04a08b2ab071a0afeb25d409e08decd
                                                                                              • Opcode Fuzzy Hash: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                                                              • Instruction Fuzzy Hash: FFA022A8C08000B2CE00E2E08080A3C23283A88308BC08BA2320CB20C0C03CE008020B
                                                                                              APIs
                                                                                              • CharPrevA.USER32(?,?,0040696C,?,00406649,?,?,00406D87,00000000,00406DAC,?,?,?,?,00000000,00000000), ref: 00406972
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CharPrev
                                                                                              • String ID:
                                                                                              • API String ID: 122130370-0
                                                                                              • Opcode ID: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                                                              • Instruction ID: 57bb655d476c0b104ac503b4dc16dcc9cc7d9309af7e6782790f501f1b0aeff9
                                                                                              • Opcode Fuzzy Hash: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                                                              • Instruction Fuzzy Hash:
                                                                                              APIs
                                                                                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407FA0
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocVirtual
                                                                                              • String ID:
                                                                                              • API String ID: 4275171209-0
                                                                                              • Opcode ID: 636722d4ca057b68616df378e1b8a5bd7f337355b9f7c137ab23b8dc1cafdb71
                                                                                              • Instruction ID: 1e7236936b067224bcb0a7c190bcfb18a105a15b1652d3161176e1d0ad605fa4
                                                                                              • Opcode Fuzzy Hash: 636722d4ca057b68616df378e1b8a5bd7f337355b9f7c137ab23b8dc1cafdb71
                                                                                              • Instruction Fuzzy Hash: 43116371A042059BDB00EF19C881B5B7794AF44359F05807AF958AB2C6DB38E800CBAA
                                                                                              APIs
                                                                                              • VirtualFree.KERNEL32(?,?,00004000,?,0000000C,?,-00000008,00003FFB,004018BF), ref: 004016B2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeVirtual
                                                                                              • String ID:
                                                                                              • API String ID: 1263568516-0
                                                                                              • Opcode ID: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                                              • Instruction ID: 63c8255cdd02620dd55efc6405714c3c0a63becca9b218cdeda95617091702f1
                                                                                              • Opcode Fuzzy Hash: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                                              • Instruction Fuzzy Hash: 3601A7726442148BC310AF28DDC093A77D5EB85364F1A4A7ED985B73A1D23B6C0587A8
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseHandle
                                                                                              • String ID:
                                                                                              • API String ID: 2962429428-0
                                                                                              • Opcode ID: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                                                              • Instruction ID: e7ddd8f09f86228f97b62737e097d00c20d119481f2284b048c56b7aa048eabb
                                                                                              • Opcode Fuzzy Hash: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                                                              • Instruction Fuzzy Hash: 41D05E82B00A6017D615F2BE4D8869692D85F89685B08843AF654E77D1D67CEC00838D
                                                                                              APIs
                                                                                              • VirtualFree.KERNEL32(?,00000000,00008000,?,00407E9D), ref: 00407ECF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeVirtual
                                                                                              • String ID:
                                                                                              • API String ID: 1263568516-0
                                                                                              • Opcode ID: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                                                              • Instruction ID: 622015b425f940adf6dc1d0f89e873b9c6d17cfe6f0c2733970da1323f12c917
                                                                                              • Opcode Fuzzy Hash: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                                                              • Instruction Fuzzy Hash: 3ED0E9B17553055BDB90EEB98CC1B0237D8BB48610F5044B66904EB296E674E8009654
                                                                                              APIs
                                                                                              • GetCurrentProcess.KERNEL32(00000028), ref: 00409457
                                                                                              • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 0040945D
                                                                                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00409476
                                                                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 0040949D
                                                                                              • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 004094A2
                                                                                              • ExitWindowsEx.USER32(00000002,00000000), ref: 004094B3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                                              • String ID: SeShutdownPrivilege
                                                                                              • API String ID: 107509674-3733053543
                                                                                              • Opcode ID: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                                                              • Instruction ID: 55e16e97e4c30333ef6e9d7cb44a764448f3c494fd9ead6bbbdf5d5bb2f9c1eb
                                                                                              • Opcode Fuzzy Hash: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                                                              • Instruction Fuzzy Hash: 61F012B069830179E610AAB18D07F6762885BC4B18F50493ABB15FA1C3D7BDD809466F
                                                                                              APIs
                                                                                              • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 00409C3E
                                                                                              • SizeofResource.KERNEL32(00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 00409C51
                                                                                              • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92,?,00000000), ref: 00409C63
                                                                                              • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92), ref: 00409C74
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Resource$FindLoadLockSizeof
                                                                                              • String ID:
                                                                                              • API String ID: 3473537107-0
                                                                                              • Opcode ID: 66472a43d98f2116202d14454299061058d21427157a3f4f4112e001326967e1
                                                                                              • Instruction ID: 5c2a5118689e511edc0a9dde7e1b9e77d0383d271af581b44440e1e73e890ea9
                                                                                              • Opcode Fuzzy Hash: 66472a43d98f2116202d14454299061058d21427157a3f4f4112e001326967e1
                                                                                              • Instruction Fuzzy Hash: B0E07E80B8874726FA6576FB08C7B6B008C4BA570EF00003BB700792C3DDBC8C04462E
                                                                                              APIs
                                                                                              • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040545A,?,?,?,00000000,0040560C), ref: 0040526B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: InfoLocale
                                                                                              • String ID:
                                                                                              • API String ID: 2299586839-0
                                                                                              • Opcode ID: b79b605a6dbd2dbd76dc5df923bc970e8acc9169766131cf64cabc826e101d13
                                                                                              • Instruction ID: 1db3d1c1bb6fab5f91442dea8a08a829cd161d84d3a7e1f0c2fe21aaaafd944f
                                                                                              • Opcode Fuzzy Hash: b79b605a6dbd2dbd76dc5df923bc970e8acc9169766131cf64cabc826e101d13
                                                                                              • Instruction Fuzzy Hash: 9ED02EA230E2006AE210808B2C84EBB4A9CCEC53A0F00007FF648C3242D2208C029B76
                                                                                              APIs
                                                                                              • GetSystemTime.KERNEL32(?), ref: 004026CE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: SystemTime
                                                                                              • String ID:
                                                                                              • API String ID: 2656138-0
                                                                                              • Opcode ID: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                                              • Instruction ID: 69442b1fa125f02c17f5f00667ba5619268a94e84ed87230136e9e38920861ba
                                                                                              • Opcode Fuzzy Hash: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                                              • Instruction Fuzzy Hash: 14E04F21E0010A82C704ABA5CD435EDF7AEAB95600B044272A418E92E0F631C251C748
                                                                                              APIs
                                                                                              • GetVersionExA.KERNEL32(?,004065F0,00000000,004065FE,?,?,?,?,?,0040A622), ref: 00405D02
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Version
                                                                                              • String ID:
                                                                                              • API String ID: 1889659487-0
                                                                                              • Opcode ID: 804cda8d473c4c61bcc63f12479ba9190822d5c554409fc9a119c77cb0a2aa37
                                                                                              • Instruction ID: 4c33b40dd65743d8d98a5ffd827b1eb297e5dd4f71424004bfe2d5ab9b26ea54
                                                                                              • Opcode Fuzzy Hash: 804cda8d473c4c61bcc63f12479ba9190822d5c554409fc9a119c77cb0a2aa37
                                                                                              • Instruction Fuzzy Hash: 00C0126040070186D7109B31DC02B1672D4AB44310F4405396DA4963C2E73C80018A6E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 4d767100099eb102bdc21c19fdb755dbde7929e86d9821f584b3da527505dd0e
                                                                                              • Instruction ID: 7dc6dc86846b3232beed044054ddb30c9891ac2fec336679fba6e94018ae2b4c
                                                                                              • Opcode Fuzzy Hash: 4d767100099eb102bdc21c19fdb755dbde7929e86d9821f584b3da527505dd0e
                                                                                              • Instruction Fuzzy Hash: C032D775E00219DFCB14CF99CA80AADB7B2BF88314F24816AD855B7385DB34AE42CF55
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,00409918), ref: 0040704D
                                                                                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407053
                                                                                              • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,00409918), ref: 004070A1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressCloseHandleModuleProc
                                                                                              • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                                                              • API String ID: 4190037839-2401316094
                                                                                              • Opcode ID: 84283e8ecd5f01446eeee6c4ca3ac4597d6d061694d9d4138b3ca6e7d0b19e25
                                                                                              • Instruction ID: c068e7fb85b52830e378cef5638f1cf195f9e270113e5aa630163df598a56aa7
                                                                                              • Opcode Fuzzy Hash: 84283e8ecd5f01446eeee6c4ca3ac4597d6d061694d9d4138b3ca6e7d0b19e25
                                                                                              • Instruction Fuzzy Hash: 72214170E04209ABDB10EAB5CC55A9E77A9EB48304F60847BA510FB3C1D7BCAE01875E
                                                                                              APIs
                                                                                              • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                                                                                              • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                                                                                              • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                                                                                              • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                                                                                              • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                                                                                              • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                                                                                              • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                                                                                              • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                                                                                              • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                                                                                              • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                                              • String ID:
                                                                                              • API String ID: 1694776339-0
                                                                                              • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                                              • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                                                                                              • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                                              • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                                                                                              APIs
                                                                                              • GetSystemDefaultLCID.KERNEL32(00000000,0040560C,?,?,?,?,00000000,00000000,00000000,?,004065EB,00000000,004065FE), ref: 004053DE
                                                                                                • Part of subcall function 0040520C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                                                                                                • Part of subcall function 00405258: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040545A,?,?,?,00000000,0040560C), ref: 0040526B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: InfoLocale$DefaultSystem
                                                                                              • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                                              • API String ID: 1044490935-665933166
                                                                                              • Opcode ID: 2becd82198b95216644133442ecc563e5ef80f5327bc31795fb041598c227e39
                                                                                              • Instruction ID: cc137df54ae1fcbb63b87987e69a719e9c27c4b31815d0debc5c9b1d2781c89a
                                                                                              • Opcode Fuzzy Hash: 2becd82198b95216644133442ecc563e5ef80f5327bc31795fb041598c227e39
                                                                                              • Instruction Fuzzy Hash: F8515374B00548ABDB00EBA59891A5F7769DB88304F50D5BBB515BB3C6CA3DCA058F1C
                                                                                              APIs
                                                                                              • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00401AB4), ref: 00401A09
                                                                                              • LocalFree.KERNEL32(0059A318,00000000,00401AB4), ref: 00401A1B
                                                                                              • VirtualFree.KERNEL32(?,00000000,00008000,0059A318,00000000,00401AB4), ref: 00401A3A
                                                                                              • LocalFree.KERNEL32(0059B318,?,00000000,00008000,0059A318,00000000,00401AB4), ref: 00401A79
                                                                                              • RtlLeaveCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AA4
                                                                                              • RtlDeleteCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AAE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                                              • String ID:
                                                                                              • API String ID: 3782394904-0
                                                                                              • Opcode ID: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                                              • Instruction ID: 5447b05044442752c1d56c7733342563ab4b4f61826a3093f511f794066d9233
                                                                                              • Opcode Fuzzy Hash: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                                              • Instruction Fuzzy Hash: 91116330341280DAD711ABA59EE2F623668B785748F44437EF444B62F2C67C9840CA9D
                                                                                              APIs
                                                                                              • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                                                                                              • ExitProcess.KERNEL32 ref: 00403DE5
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExitMessageProcess
                                                                                              • String ID: Error$Runtime error at 00000000$9@
                                                                                              • API String ID: 1220098344-1503883590
                                                                                              • Opcode ID: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                                              • Instruction ID: db3008c0e6bc5d60e05df0545d3e9f81ce91e923819fa2a9fb93000da4b6b716
                                                                                              • Opcode Fuzzy Hash: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                                              • Instruction Fuzzy Hash: B521F830A04341CAE714EFA59AD17153E98AB49349F04837BD500B73E3C77C8A45C76E
                                                                                              APIs
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                                                                                              • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                                                                                              • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWide$AllocString
                                                                                              • String ID:
                                                                                              • API String ID: 262959230-0
                                                                                              • Opcode ID: 759139aa8138bb4f1b890a81a570935fc2f09484a8ccbcda4eb7e9d11bc9ffe5
                                                                                              • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                                                                                              • Opcode Fuzzy Hash: 759139aa8138bb4f1b890a81a570935fc2f09484a8ccbcda4eb7e9d11bc9ffe5
                                                                                              • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(00000000,0040A60E), ref: 004030E3
                                                                                              • GetCommandLineA.KERNEL32(00000000,0040A60E), ref: 004030EE
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CommandHandleLineModule
                                                                                              • String ID: H%X$U1hd.@
                                                                                              • API String ID: 2123368496-2813669354
                                                                                              • Opcode ID: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                                              • Instruction ID: 0f926add87520dc699e98d27074396f9fab16295c11a520b4b5863bd90c7cb52
                                                                                              • Opcode Fuzzy Hash: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                                              • Instruction Fuzzy Hash: 03C01274541300CAD328AFF69E8A304B990A385349F40823FA608BA2F1CA7C4201EBDD
                                                                                              APIs
                                                                                              • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000,00409918,00000000), ref: 00406E4C
                                                                                              • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,70000000,?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000), ref: 00406EBC
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: QueryValue
                                                                                              • String ID: )q@
                                                                                              • API String ID: 3660427363-2284170586
                                                                                              • Opcode ID: 32d2d681139902fa63b50b1e86c1c6042aee641263ad409bd5d16b68eaa8278f
                                                                                              • Instruction ID: 22a93fbabe645b78fd14ced98f65bd4bcb22fe3fd6f8222f7fa8e6a3c98f8dfc
                                                                                              • Opcode Fuzzy Hash: 32d2d681139902fa63b50b1e86c1c6042aee641263ad409bd5d16b68eaa8278f
                                                                                              • Instruction Fuzzy Hash: E6415E31D0021AAFDB21DF95C881BAFB7B8EB04704F56447AE901F7280D738AF108B99
                                                                                              APIs
                                                                                              • MessageBoxA.USER32(00000000,00000000,Setup,00000010), ref: 00409CBD
                                                                                              Strings
                                                                                              • The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si, xrefs: 00409CA1
                                                                                              • Setup, xrefs: 00409CAD
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Message
                                                                                              • String ID: Setup$The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si
                                                                                              • API String ID: 2030045667-3271211647
                                                                                              • Opcode ID: bc66b1cf8cea732a030952d466b76090b354ad7a58696f118c0a4b0261ee3717
                                                                                              • Instruction ID: b8b600ed6bdfe48e96a015bdf4867c85bc36f5512d0f27a60c0f94c744360238
                                                                                              • Opcode Fuzzy Hash: bc66b1cf8cea732a030952d466b76090b354ad7a58696f118c0a4b0261ee3717
                                                                                              • Instruction Fuzzy Hash: 8EE0E5302482087EE311EA528C13F6A7BACE789B04F600477F900B15C3D6786E00A068
                                                                                              APIs
                                                                                              • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 004094F7
                                                                                              • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 00409507
                                                                                              • GetLastError.KERNEL32(?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 0040951A
                                                                                              • GetLastError.KERNEL32(?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 00409524
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.2544934971.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.2544895907.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545110417.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.2545270580.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLastSleep
                                                                                              • String ID:
                                                                                              • API String ID: 1458359878-0
                                                                                              • Opcode ID: 97bb3b87fdda019371420e794be163fcf62410a15a23215566f33b90e6dc6563
                                                                                              • Instruction ID: cd4a420f7ace5638a97e0bdb8a1e9fccbb234b9240edd4770f97938e6011a3cc
                                                                                              • Opcode Fuzzy Hash: 97bb3b87fdda019371420e794be163fcf62410a15a23215566f33b90e6dc6563
                                                                                              • Instruction Fuzzy Hash: 16F0967360451477CA35A5AF9D81A5F634DDAD1354B10813BE945F3283C538DD0142A9

                                                                                              Execution Graph

                                                                                              Execution Coverage:16.2%
                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                              Signature Coverage:4.7%
                                                                                              Total number of Nodes:2000
                                                                                              Total number of Limit Nodes:86
                                                                                              execution_graph 49368 40cd00 49369 40cd12 49368->49369 49370 40cd0d 49368->49370 49372 406f48 CloseHandle 49370->49372 49372->49369 53310 498ba8 53368 403344 53310->53368 53312 498bb6 53371 4056a0 53312->53371 53314 498bbb 53374 40631c GetModuleHandleA GetProcAddress 53314->53374 53318 498bc5 53382 40994c 53318->53382 53649 4032fc 53368->53649 53370 403349 GetModuleHandleA GetCommandLineA 53370->53312 53373 4056db 53371->53373 53650 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53371->53650 53373->53314 53375 406338 53374->53375 53376 40633f GetProcAddress 53374->53376 53375->53376 53377 406355 GetProcAddress 53376->53377 53378 40634e 53376->53378 53379 406364 SetProcessDEPPolicy 53377->53379 53380 406368 53377->53380 53378->53377 53379->53380 53381 4063c4 6FCB1CD0 53380->53381 53381->53318 53651 409024 53382->53651 53649->53370 53650->53373 53652 408cbc 5 API calls 53651->53652 53653 409035 53652->53653 53654 4085dc GetSystemDefaultLCID 53653->53654 53658 408612 53654->53658 53655 406dec LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53655->53658 53656 408568 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 53656->53658 53657 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53657->53658 53658->53655 53658->53656 53658->53657 53662 408674 53658->53662 53659 406dec LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53659->53662 53660 408568 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 53660->53662 53661 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53661->53662 53662->53659 53662->53660 53662->53661 53663 4086f7 53662->53663 53664 403420 4 API calls 53663->53664 53665 408711 53664->53665 53666 408720 GetSystemDefaultLCID 53665->53666 53723 408568 GetLocaleInfoA 53666->53723 53669 403450 4 API calls 53670 408760 53669->53670 53671 408568 5 API calls 53670->53671 53672 408775 53671->53672 53673 408568 5 API calls 53672->53673 53674 408799 53673->53674 53729 4085b4 GetLocaleInfoA 53674->53729 53677 4085b4 GetLocaleInfoA 53678 4087c9 53677->53678 53679 408568 5 API calls 53678->53679 53680 4087e3 53679->53680 53681 4085b4 GetLocaleInfoA 53680->53681 53682 408800 53681->53682 53683 408568 5 API calls 53682->53683 53684 40881a 53683->53684 53685 403450 4 API calls 53684->53685 53686 408827 53685->53686 53687 408568 5 API calls 53686->53687 53688 40883c 53687->53688 53689 403450 4 API calls 53688->53689 53724 4085a1 53723->53724 53725 40858f 53723->53725 53727 403494 4 API calls 53724->53727 53726 4034e0 4 API calls 53725->53726 53728 40859f 53726->53728 53727->53728 53728->53669 53730 4085d0 53729->53730 53730->53677 55084 42f520 55085 42f52f NtdllDefWindowProc_A 55084->55085 55086 42f52b 55084->55086 55085->55086 49373 416b42 49374 416bea 49373->49374 49375 416b5a 49373->49375 49392 41531c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49374->49392 49377 416b74 SendMessageA 49375->49377 49378 416b68 49375->49378 49388 416bc8 49377->49388 49379 416b72 CallWindowProcA 49378->49379 49380 416b8e 49378->49380 49379->49388 49389 41a058 GetSysColor 49380->49389 49383 416b99 SetTextColor 49384 416bae 49383->49384 49390 41a058 GetSysColor 49384->49390 49386 416bb3 SetBkColor 49391 41a6e0 GetSysColor CreateBrushIndirect 49386->49391 49389->49383 49390->49386 49391->49388 49392->49388 55087 4358e0 55088 4358f5 55087->55088 55089 43590f 55088->55089 55093 4352c8 55088->55093 55100 435312 55093->55100 55104 4352f8 55093->55104 55094 403400 4 API calls 55095 435717 55094->55095 55095->55089 55106 435728 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55095->55106 55096 446da4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55096->55104 55097 403744 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55097->55104 55098 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55098->55104 55099 402648 4 API calls 55099->55104 55100->55094 55102 431ca0 4 API calls 55102->55104 55103 4038a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55103->55104 55104->55096 55104->55097 55104->55098 55104->55099 55104->55100 55104->55102 55104->55103 55107 4343b0 55104->55107 55119 434b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55104->55119 55106->55089 55108 43446d 55107->55108 55109 4343dd 55107->55109 55138 434310 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55108->55138 55111 403494 4 API calls 55109->55111 55113 4343eb 55111->55113 55112 43445f 55114 403400 4 API calls 55112->55114 55115 403778 4 API calls 55113->55115 55116 4344bd 55114->55116 55117 43440c 55115->55117 55116->55104 55117->55112 55120 494944 55117->55120 55119->55104 55121 49497c 55120->55121 55122 494a14 55120->55122 55123 403494 4 API calls 55121->55123 55139 448930 55122->55139 55127 494987 55123->55127 55125 403400 4 API calls 55126 494a38 55125->55126 55128 403400 4 API calls 55126->55128 55129 4037b8 4 API calls 55127->55129 55131 494997 55127->55131 55130 494a40 55128->55130 55132 4949b0 55129->55132 55130->55117 55131->55125 55132->55131 55133 4037b8 4 API calls 55132->55133 55134 4949d3 55133->55134 55135 403778 4 API calls 55134->55135 55136 494a04 55135->55136 55137 403634 4 API calls 55136->55137 55137->55122 55138->55112 55140 448955 55139->55140 55150 448998 55139->55150 55141 403494 4 API calls 55140->55141 55145 448960 55141->55145 55142 4489ac 55144 403400 4 API calls 55142->55144 55147 4489df 55144->55147 55146 4037b8 4 API calls 55145->55146 55148 44897c 55146->55148 55147->55131 55149 4037b8 4 API calls 55148->55149 55149->55150 55150->55142 55151 44852c 55150->55151 55152 403494 4 API calls 55151->55152 55153 448562 55152->55153 55154 4037b8 4 API calls 55153->55154 55155 448574 55154->55155 55156 403778 4 API calls 55155->55156 55157 448595 55156->55157 55158 4037b8 4 API calls 55157->55158 55159 4485ad 55158->55159 55160 403778 4 API calls 55159->55160 55161 4485d8 55160->55161 55162 4037b8 4 API calls 55161->55162 55173 4485f0 55162->55173 55163 448628 55165 403420 4 API calls 55163->55165 55164 4486c3 55169 4486cb GetProcAddress 55164->55169 55166 448708 55165->55166 55166->55142 55167 44864b LoadLibraryExA 55167->55173 55168 44865d LoadLibraryA 55168->55173 55170 4486de 55169->55170 55170->55163 55171 403b80 4 API calls 55171->55173 55172 403450 4 API calls 55172->55173 55173->55163 55173->55164 55173->55167 55173->55168 55173->55171 55173->55172 55175 43da88 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55173->55175 55175->55173 49393 402584 49394 402598 49393->49394 49395 4025ab 49393->49395 49423 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 49394->49423 49396 4025c2 RtlEnterCriticalSection 49395->49396 49397 4025cc 49395->49397 49396->49397 49409 4023b4 13 API calls 49397->49409 49400 40259d 49400->49395 49401 4025a1 49400->49401 49402 4025d5 49403 4025d9 49402->49403 49410 402088 49402->49410 49405 402635 49403->49405 49406 40262b RtlLeaveCriticalSection 49403->49406 49406->49405 49407 4025e5 49407->49403 49424 402210 9 API calls 49407->49424 49409->49402 49411 40209c 49410->49411 49412 4020af 49410->49412 49431 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 49411->49431 49414 4020c6 RtlEnterCriticalSection 49412->49414 49417 4020d0 49412->49417 49414->49417 49415 4020a1 49415->49412 49416 4020a5 49415->49416 49422 402106 49416->49422 49417->49422 49425 401f94 49417->49425 49420 4021f1 RtlLeaveCriticalSection 49421 4021fb 49420->49421 49421->49407 49422->49407 49423->49400 49424->49403 49426 401fa4 49425->49426 49427 401fd0 49426->49427 49430 401ff4 49426->49430 49432 401f0c 49426->49432 49427->49430 49437 401db4 49427->49437 49430->49420 49430->49421 49431->49415 49441 40178c 49432->49441 49434 401f1c 49435 401f29 49434->49435 49450 401e80 9 API calls 49434->49450 49435->49426 49438 401dd2 49437->49438 49439 401e02 49437->49439 49438->49430 49439->49438 49466 401d1c 49439->49466 49444 4017a8 49441->49444 49443 4017b2 49451 401678 49443->49451 49444->49443 49446 4017be 49444->49446 49448 401803 49444->49448 49455 4014e4 49444->49455 49463 4013e0 LocalAlloc 49444->49463 49446->49434 49464 4015c0 VirtualFree 49448->49464 49450->49435 49453 4016be 49451->49453 49452 4016ee 49452->49446 49453->49452 49454 4016da VirtualAlloc 49453->49454 49454->49452 49454->49453 49456 4014f3 VirtualAlloc 49455->49456 49458 401520 49456->49458 49459 401543 49456->49459 49465 401398 LocalAlloc 49458->49465 49459->49444 49461 40152c 49461->49459 49462 401530 VirtualFree 49461->49462 49462->49459 49463->49444 49464->49446 49465->49461 49467 401d2e 49466->49467 49468 401d51 49467->49468 49469 401d63 49467->49469 49479 401940 49468->49479 49471 401940 3 API calls 49469->49471 49472 401d61 49471->49472 49473 401d79 49472->49473 49489 401bf8 9 API calls 49472->49489 49473->49438 49475 401d88 49476 401da2 49475->49476 49490 401c4c 9 API calls 49475->49490 49491 401454 LocalAlloc 49476->49491 49480 401966 49479->49480 49488 4019bf 49479->49488 49492 40170c 49480->49492 49484 40199a 49484->49488 49498 401454 LocalAlloc 49484->49498 49485 401983 49485->49484 49497 4015c0 VirtualFree 49485->49497 49488->49472 49489->49475 49490->49476 49491->49473 49494 401743 49492->49494 49493 401783 49496 4013e0 LocalAlloc 49493->49496 49494->49493 49495 40175d VirtualFree 49494->49495 49495->49494 49496->49485 49497->49484 49498->49488 49499 416644 49500 416651 49499->49500 49501 4166ab 49499->49501 49506 416550 CreateWindowExA 49500->49506 49502 416658 SetPropA SetPropA 49502->49501 49503 41668b 49502->49503 49504 41669e SetWindowPos 49503->49504 49504->49501 49506->49502 55176 4222e4 55177 4222f3 55176->55177 55182 421274 55177->55182 55179 422313 55183 4212e3 55182->55183 55187 421283 55182->55187 55186 4212f4 55183->55186 55207 4124d0 GetMenuItemCount GetMenuStringA GetMenuState 55183->55207 55185 421322 55189 421395 55185->55189 55194 42133d 55185->55194 55186->55185 55188 4213ba 55186->55188 55187->55183 55206 408d2c 19 API calls 55187->55206 55191 4213ce SetMenu 55188->55191 55204 421393 55188->55204 55196 4213a9 55189->55196 55189->55204 55190 4213e6 55210 4211bc 10 API calls 55190->55210 55191->55204 55199 421360 GetMenu 55194->55199 55194->55204 55195 4213ed 55195->55179 55205 4221e8 10 API calls 55195->55205 55198 4213b2 SetMenu 55196->55198 55198->55204 55200 421383 55199->55200 55201 42136a 55199->55201 55208 4124d0 GetMenuItemCount GetMenuStringA GetMenuState 55200->55208 55203 42137d SetMenu 55201->55203 55203->55200 55204->55190 55209 421e2c 11 API calls 55204->55209 55205->55179 55206->55187 55207->55186 55208->55204 55209->55190 55210->55195 55211 44b4a8 55212 44b4d5 55211->55212 55213 44b4b6 55211->55213 55213->55212 55214 44b38c 11 API calls 55213->55214 55214->55212 55215 448728 55216 448756 55215->55216 55217 44875d 55215->55217 55219 403400 4 API calls 55216->55219 55218 448771 55217->55218 55220 44852c 7 API calls 55217->55220 55218->55216 55221 403494 4 API calls 55218->55221 55222 448907 55219->55222 55220->55218 55223 44878a 55221->55223 55224 4037b8 4 API calls 55223->55224 55225 4487a6 55224->55225 55226 4037b8 4 API calls 55225->55226 55227 4487c2 55226->55227 55227->55216 55228 4487d6 55227->55228 55229 4037b8 4 API calls 55228->55229 55230 4487f0 55229->55230 55231 431bd0 4 API calls 55230->55231 55232 448812 55231->55232 55233 431ca0 4 API calls 55232->55233 55238 448832 55232->55238 55233->55232 55234 448888 55247 442334 55234->55247 55236 448870 55236->55234 55259 4435d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55236->55259 55238->55236 55258 4435d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55238->55258 55240 4488bc GetLastError 55260 4484c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55240->55260 55242 4488cb 55261 443610 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55242->55261 55244 4488e0 55262 443620 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55244->55262 55246 4488e8 55248 443312 55247->55248 55249 44236d 55247->55249 55251 403400 4 API calls 55248->55251 55250 403400 4 API calls 55249->55250 55252 442375 55250->55252 55253 443327 55251->55253 55254 431bd0 4 API calls 55252->55254 55253->55240 55255 442381 55254->55255 55256 443302 55255->55256 55263 441a0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55255->55263 55256->55240 55258->55238 55259->55234 55260->55242 55261->55244 55262->55246 55263->55255 55264 4165ec DestroyWindow 55265 42e3ef SetErrorMode 49507 441394 49508 44139d 49507->49508 49509 4413ab WriteFile 49507->49509 49508->49509 49510 4413b6 49509->49510 49511 416410 49513 416422 49511->49513 49512 416462 GetClassInfoA 49514 41648e 49512->49514 49513->49512 49531 408d2c 19 API calls 49513->49531 49516 4164ee 49514->49516 49517 4164b0 RegisterClassA 49514->49517 49518 4164a0 UnregisterClassA 49514->49518 49522 416517 49516->49522 49523 4164e9 49516->49523 49517->49516 49520 4164d8 49517->49520 49518->49517 49519 41645d 49519->49512 49532 408cbc 49520->49532 49540 407544 49522->49540 49523->49516 49524 408cbc 5 API calls 49523->49524 49524->49522 49528 416530 49545 41a1e8 49528->49545 49530 41653a 49531->49519 49533 408cc8 49532->49533 49553 406dec LoadStringA 49533->49553 49541 407552 49540->49541 49542 407548 49540->49542 49544 418384 7 API calls 49541->49544 49543 402660 4 API calls 49542->49543 49543->49541 49544->49528 49546 41a213 49545->49546 49547 41a2af 49545->49547 49586 403520 49546->49586 49548 403400 4 API calls 49547->49548 49549 41a2c7 49548->49549 49549->49530 49551 41a2a3 CreateFontIndirectA 49551->49547 49552 41a26b 49552->49551 49566 4034e0 49553->49566 49556 403450 49557 403454 49556->49557 49560 403464 49556->49560 49559 4034bc 4 API calls 49557->49559 49557->49560 49558 403490 49562 403400 49558->49562 49559->49560 49560->49558 49581 402660 49560->49581 49563 40341f 49562->49563 49564 403406 49562->49564 49563->49523 49564->49563 49565 402660 4 API calls 49564->49565 49565->49563 49571 4034bc 49566->49571 49568 4034f0 49569 403400 4 API calls 49568->49569 49570 403508 49569->49570 49570->49556 49572 4034c0 49571->49572 49573 4034dc 49571->49573 49576 402648 49572->49576 49573->49568 49575 4034c9 49575->49568 49577 40264c 49576->49577 49578 402656 49576->49578 49577->49578 49580 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49577->49580 49578->49575 49578->49578 49580->49578 49582 402664 49581->49582 49584 40266e 49581->49584 49582->49584 49585 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49582->49585 49584->49558 49585->49584 49587 4034e0 4 API calls 49586->49587 49588 40352a 49587->49588 49588->49552 55266 491bf8 55267 491c32 55266->55267 55268 491c3e 55267->55268 55269 491c34 55267->55269 55271 491c4d 55268->55271 55272 491c76 55268->55272 55464 409098 MessageBeep 55269->55464 55465 446ff8 18 API calls 55271->55465 55279 491cae 55272->55279 55280 491c85 55272->55280 55273 403420 4 API calls 55275 49228a 55273->55275 55277 403400 4 API calls 55275->55277 55276 491c5a 55466 406bb0 55276->55466 55282 492292 55277->55282 55287 491cbd 55279->55287 55288 491ce6 55279->55288 55474 446ff8 18 API calls 55280->55474 55284 491c92 55475 406c00 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55284->55475 55477 446ff8 18 API calls 55287->55477 55293 491d0e 55288->55293 55294 491cf5 55288->55294 55289 491c9d 55476 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 55289->55476 55292 491cca 55478 406c34 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55292->55478 55302 491d1d 55293->55302 55303 491d42 55293->55303 55480 407280 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetCurrentDirectoryA 55294->55480 55295 491c39 55295->55273 55298 491cd5 55479 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 55298->55479 55299 491cfd 55481 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 55299->55481 55482 446ff8 18 API calls 55302->55482 55306 491d7a 55303->55306 55307 491d51 55303->55307 55305 491d2a 55308 4072a8 SetCurrentDirectoryA 55305->55308 55314 491d89 55306->55314 55315 491db2 55306->55315 55484 446ff8 18 API calls 55307->55484 55310 491d32 55308->55310 55483 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 55310->55483 55312 491d5e 55313 42c804 5 API calls 55312->55313 55317 491d69 55313->55317 55486 446ff8 18 API calls 55314->55486 55321 491dfe 55315->55321 55322 491dc1 55315->55322 55485 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 55317->55485 55318 491d96 55487 4071f8 8 API calls 55318->55487 55327 491e0d 55321->55327 55328 491e36 55321->55328 55489 446ff8 18 API calls 55322->55489 55323 491da1 55488 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 55323->55488 55326 491dd0 55490 446ff8 18 API calls 55326->55490 55493 446ff8 18 API calls 55327->55493 55335 491e6e 55328->55335 55336 491e45 55328->55336 55331 491de1 55491 4918fc 8 API calls 55331->55491 55332 491e1a 55334 42c8a4 5 API calls 55332->55334 55340 491e25 55334->55340 55344 491e7d 55335->55344 55345 491ea6 55335->55345 55495 446ff8 18 API calls 55336->55495 55337 491ded 55492 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 55337->55492 55494 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 55340->55494 55341 491e52 55343 42c8cc 5 API calls 55341->55343 55346 491e5d 55343->55346 55497 446ff8 18 API calls 55344->55497 55350 491ede 55345->55350 55351 491eb5 55345->55351 55496 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 55346->55496 55349 491e8a 55498 42c8fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 55349->55498 55358 491eed 55350->55358 55359 491f16 55350->55359 55500 446ff8 18 API calls 55351->55500 55354 491e95 55499 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 55354->55499 55355 491ec2 55357 42c92c 5 API calls 55355->55357 55360 491ecd 55357->55360 55502 446ff8 18 API calls 55358->55502 55365 491f62 55359->55365 55366 491f25 55359->55366 55501 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 55360->55501 55363 491efa 55364 42c954 5 API calls 55363->55364 55367 491f05 55364->55367 55371 491f71 55365->55371 55372 491fb4 55365->55372 55504 446ff8 18 API calls 55366->55504 55503 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 55367->55503 55370 491f34 55505 446ff8 18 API calls 55370->55505 55508 446ff8 18 API calls 55371->55508 55380 491fc3 55372->55380 55381 492027 55372->55381 55375 491f45 55506 42c4f8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 55375->55506 55376 491f84 55509 446ff8 18 API calls 55376->55509 55379 491f51 55507 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 55379->55507 55454 446ff8 18 API calls 55380->55454 55387 492066 55381->55387 55388 492036 55381->55388 55383 491f95 55510 491af4 12 API calls 55383->55510 55385 491fd0 55455 42c608 7 API calls 55385->55455 55399 4920a5 55387->55399 55400 492075 55387->55400 55514 446ff8 18 API calls 55388->55514 55390 491fa3 55511 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 55390->55511 55392 491fde 55395 491fe2 55392->55395 55396 492017 55392->55396 55394 492043 55515 452908 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection DeleteFileA GetLastError 55394->55515 55456 446ff8 18 API calls 55395->55456 55513 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 55396->55513 55408 4920e4 55399->55408 55409 4920b4 55399->55409 55517 446ff8 18 API calls 55400->55517 55402 492050 55516 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 55402->55516 55403 491ff1 55457 452c80 55403->55457 55407 492082 55412 452770 5 API calls 55407->55412 55419 49212c 55408->55419 55420 4920f3 55408->55420 55519 446ff8 18 API calls 55409->55519 55410 492061 55410->55295 55411 492001 55512 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 55411->55512 55415 49208f 55412->55415 55518 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 55415->55518 55417 4920c1 55520 452e10 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection RemoveDirectoryA GetLastError 55417->55520 55426 49213b 55419->55426 55427 492174 55419->55427 55522 446ff8 18 API calls 55420->55522 55422 4920ce 55521 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 55422->55521 55423 492102 55523 446ff8 18 API calls 55423->55523 55525 446ff8 18 API calls 55426->55525 55431 492187 55427->55431 55438 49223d 55427->55438 55428 492113 55524 447278 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 55428->55524 55430 49214a 55526 446ff8 18 API calls 55430->55526 55528 446ff8 18 API calls 55431->55528 55435 49215b 55527 447278 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 55435->55527 55436 4921b4 55529 446ff8 18 API calls 55436->55529 55438->55295 55534 446f9c 18 API calls 55438->55534 55440 4921cb 55530 407ddc 7 API calls 55440->55530 55442 492256 55443 42e8c8 5 API calls 55442->55443 55445 49225e 55443->55445 55535 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 55445->55535 55447 4921ed 55531 446ff8 18 API calls 55447->55531 55449 492201 55532 408508 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55449->55532 55451 49220c 55533 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 55451->55533 55453 492218 55454->55385 55455->55392 55456->55403 55458 452724 2 API calls 55457->55458 55459 452c99 55458->55459 55460 452c9d 55459->55460 55461 452cc1 MoveFileA GetLastError 55459->55461 55460->55411 55462 452760 Wow64RevertWow64FsRedirection 55461->55462 55463 452ce7 55462->55463 55463->55411 55464->55295 55465->55276 55467 406bbf 55466->55467 55468 406be1 55467->55468 55469 406bd8 55467->55469 55472 403778 4 API calls 55468->55472 55470 403400 4 API calls 55469->55470 55471 406bdf 55470->55471 55473 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 55471->55473 55472->55471 55473->55295 55474->55284 55475->55289 55476->55295 55477->55292 55478->55298 55479->55295 55480->55299 55481->55295 55482->55305 55483->55295 55484->55312 55485->55295 55486->55318 55487->55323 55488->55295 55489->55326 55490->55331 55491->55337 55492->55295 55493->55332 55494->55295 55495->55341 55496->55295 55497->55349 55498->55354 55499->55295 55500->55355 55501->55295 55502->55363 55503->55295 55504->55370 55505->55375 55506->55379 55507->55295 55508->55376 55509->55383 55510->55390 55511->55295 55512->55295 55513->55295 55514->55394 55515->55402 55516->55410 55517->55407 55518->55295 55519->55417 55520->55422 55521->55295 55522->55423 55523->55428 55524->55295 55525->55430 55526->55435 55527->55295 55528->55436 55529->55440 55530->55447 55531->55449 55532->55451 55533->55453 55534->55442 55535->55295 55536 40cc34 55539 406f10 WriteFile 55536->55539 55540 406f2d 55539->55540 49589 48095d 49594 451004 49589->49594 49591 480971 49604 47fa0c 49591->49604 49593 480995 49595 451011 49594->49595 49597 451065 49595->49597 49613 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49595->49613 49610 450e88 49597->49610 49600 45108d 49602 4510d0 49600->49602 49615 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49600->49615 49602->49591 49620 40b3c8 49604->49620 49606 47fa79 49606->49593 49609 47fa2e 49609->49606 49624 4069dc 49609->49624 49627 476994 49609->49627 49616 450e34 49610->49616 49613->49597 49614 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49614->49600 49615->49602 49617 450e57 49616->49617 49618 450e46 49616->49618 49617->49600 49617->49614 49619 450e4b InterlockedExchange 49618->49619 49619->49617 49621 40b3d3 49620->49621 49622 40b3f3 49621->49622 49643 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49621->49643 49622->49609 49625 402648 4 API calls 49624->49625 49626 4069e7 49625->49626 49626->49609 49629 4769c5 49627->49629 49631 476a0e 49627->49631 49628 476a59 49644 451294 49628->49644 49629->49631 49638 403450 4 API calls 49629->49638 49641 451294 21 API calls 49629->49641 49654 4038a4 49629->49654 49663 403744 49629->49663 49631->49628 49635 4038a4 4 API calls 49631->49635 49639 403744 4 API calls 49631->49639 49640 403450 4 API calls 49631->49640 49642 451294 21 API calls 49631->49642 49633 476a70 49650 403420 49633->49650 49635->49631 49638->49629 49639->49631 49640->49631 49641->49629 49642->49631 49643->49622 49645 4512af 49644->49645 49649 4512a4 49644->49649 49667 451238 21 API calls 49645->49667 49647 4512ba 49647->49649 49668 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49647->49668 49649->49633 49652 403426 49650->49652 49651 40344b 49651->49609 49652->49651 49653 402660 4 API calls 49652->49653 49653->49652 49655 4038b1 49654->49655 49662 4038e1 49654->49662 49657 4038da 49655->49657 49658 4038bd 49655->49658 49656 403400 4 API calls 49661 4038cb 49656->49661 49659 4034bc 4 API calls 49657->49659 49669 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49658->49669 49659->49662 49661->49629 49662->49656 49664 40374a 49663->49664 49666 40375b 49663->49666 49665 4034bc 4 API calls 49664->49665 49664->49666 49665->49666 49666->49629 49667->49647 49668->49649 49669->49661 49670 41ee54 49671 41ee63 IsWindowVisible 49670->49671 49672 41ee99 49670->49672 49671->49672 49673 41ee6d IsWindowEnabled 49671->49673 49673->49672 49674 41ee77 49673->49674 49675 402648 4 API calls 49674->49675 49676 41ee81 EnableWindow 49675->49676 49676->49672 49677 46bb10 49678 46bb44 49677->49678 49710 46bfad 49677->49710 49679 46bb80 49678->49679 49681 46bbdc 49678->49681 49682 46bbba 49678->49682 49683 46bbcb 49678->49683 49684 46bb98 49678->49684 49685 46bba9 49678->49685 49679->49710 49768 468c74 49679->49768 49680 403400 4 API calls 49687 46bfec 49680->49687 50000 46baa0 45 API calls 49681->50000 49733 46b6d0 49682->49733 49999 46b890 67 API calls 49683->49999 49997 46b420 47 API calls 49684->49997 49998 46b588 42 API calls 49685->49998 49693 403400 4 API calls 49687->49693 49694 46bff4 49693->49694 49695 46bb9e 49695->49679 49695->49710 49696 46bc18 49704 46bc5b 49696->49704 49696->49710 50001 494da0 49696->50001 49699 46bd7e 50020 48358c 123 API calls 49699->50020 49702 42cbc0 6 API calls 49702->49704 49703 46bd99 49703->49710 49704->49699 49704->49702 49705 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49704->49705 49706 46af68 23 API calls 49704->49706 49709 414ae8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49704->49709 49704->49710 49712 46bdd7 49704->49712 49729 46be9f 49704->49729 49771 468bb0 49704->49771 49779 46acd4 49704->49779 49924 483084 49704->49924 50037 46b1dc 19 API calls 49704->50037 49705->49704 49706->49704 49709->49704 49710->49680 49711 46af68 23 API calls 49711->49710 49786 469f1c 49712->49786 49714 46be3d 49715 403450 4 API calls 49714->49715 49716 46be4d 49715->49716 49717 46bea9 49716->49717 49718 46be59 49716->49718 49723 46bf6b 49717->49723 49847 46af68 49717->49847 50021 457f1c 49718->50021 49722 457f1c 24 API calls 49722->49729 49729->49711 50038 46c424 49733->50038 49736 46b852 49737 403420 4 API calls 49736->49737 49739 46b86c 49737->49739 49741 403400 4 API calls 49739->49741 49740 46b71e 49766 46b83e 49740->49766 50045 455f84 13 API calls 49740->50045 49743 46b874 49741->49743 49742 403450 4 API calls 49742->49736 49745 403400 4 API calls 49743->49745 49746 46b87c 49745->49746 49746->49679 49747 46b7a1 49747->49736 49750 46b801 49747->49750 50055 42cd48 49747->50055 49748 46b73c 49748->49747 50046 466600 49748->50046 49750->49736 49753 42cd48 7 API calls 49750->49753 49750->49766 49756 46b817 49753->49756 49761 451458 4 API calls 49756->49761 49756->49766 49757 466600 19 API calls 49759 46b77c 49757->49759 50050 451428 49759->50050 49763 46b82e 49761->49763 50062 47efd0 42 API calls 49763->50062 49766->49736 49766->49742 49769 468bb0 19 API calls 49768->49769 49770 468c83 49769->49770 49770->49696 49774 468bdf 49771->49774 49772 4078f4 19 API calls 49773 468c18 49772->49773 50319 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49773->50319 49774->49772 49776 468c20 49774->49776 49777 403400 4 API calls 49776->49777 49778 468c38 49777->49778 49778->49704 49780 46ace5 49779->49780 49781 46ace0 49779->49781 50405 469a80 46 API calls 49780->50405 49782 46ace3 49781->49782 50320 46a740 49781->50320 49782->49704 49784 46aced 49784->49704 49787 403400 4 API calls 49786->49787 49788 469f4a 49787->49788 50782 47dd00 49788->50782 49790 469fad 49791 469fb1 49790->49791 49792 469fca 49790->49792 50789 466800 49791->50789 49793 469fbb 49792->49793 50792 494c90 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49792->50792 49797 46a154 49793->49797 49798 46a0e9 49793->49798 49846 46a25e 49793->49846 49796 469fe6 49796->49793 49800 469fee 49796->49800 49802 403494 4 API calls 49797->49802 49801 403494 4 API calls 49798->49801 49799 403420 4 API calls 49803 46a288 49799->49803 49804 46af68 23 API calls 49800->49804 49805 46a0f6 49801->49805 49806 46a161 49802->49806 49803->49714 49814 469ffb 49804->49814 49807 40357c 4 API calls 49805->49807 49808 40357c 4 API calls 49806->49808 49809 46a103 49807->49809 49810 46a16e 49808->49810 49811 40357c 4 API calls 49809->49811 49812 40357c 4 API calls 49810->49812 49815 46a110 49811->49815 49813 46a17b 49812->49813 49817 40357c 4 API calls 49813->49817 49820 46a024 SetActiveWindow 49814->49820 49825 46a03c 49814->49825 49816 40357c 4 API calls 49815->49816 49818 46a11d 49816->49818 49819 46a188 49817->49819 49821 466800 20 API calls 49818->49821 49822 40357c 4 API calls 49819->49822 49820->49825 49823 46a12b 49821->49823 49824 46a196 49822->49824 49826 40357c 4 API calls 49823->49826 49827 414b18 4 API calls 49824->49827 50793 42f560 49825->50793 49830 46a134 49826->49830 49831 46a152 49827->49831 49833 40357c 4 API calls 49830->49833 50810 466b38 49831->50810 49836 46a141 49833->49836 49835 46a08d 49838 46ade4 21 API calls 49835->49838 49837 414b18 4 API calls 49836->49837 49837->49831 49839 46a0bf 49838->49839 49839->49714 49840 46a1b8 49841 414b18 4 API calls 49840->49841 49840->49846 49842 46a21b 49841->49842 50813 495b50 MulDiv 49842->50813 49846->49799 49848 468c74 19 API calls 49847->49848 49849 46af80 49848->49849 49850 46afa2 49849->49850 49851 4652cc 7 API calls 49849->49851 50995 4652cc 49850->50995 49851->49850 49855 46afba 49856 46ade4 21 API calls 49855->49856 49857 46aff2 49856->49857 49858 414b18 4 API calls 49857->49858 49859 46b006 49858->49859 49860 46b012 49859->49860 49861 46b03c 49859->49861 49862 414b18 4 API calls 49860->49862 49863 46b05b 49861->49863 49864 46b085 49861->49864 49865 46b026 49862->49865 49866 414b18 4 API calls 49863->49866 49867 414b18 4 API calls 49864->49867 49868 414b18 4 API calls 49865->49868 49869 46b06f 49866->49869 49870 46b099 49867->49870 49871 46b03a 49868->49871 49872 414b18 4 API calls 49869->49872 49873 414b18 4 API calls 49870->49873 51012 46acfc 49871->51012 49872->49871 49873->49871 49876 468c74 19 API calls 49879 46b137 49876->49879 49878 46b0d7 49878->49876 49880 46b19a 49879->49880 51017 494cec 18 API calls 49879->51017 49925 46c424 48 API calls 49924->49925 49926 4830c7 49925->49926 49927 4830d0 49926->49927 51271 408be0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 49926->51271 49929 414ae8 4 API calls 49927->49929 49930 4830e0 49929->49930 49931 403450 4 API calls 49930->49931 49932 4830ed 49931->49932 51073 46c77c 49932->51073 49935 4830fd 49937 414ae8 4 API calls 49935->49937 49938 48310d 49937->49938 49939 403450 4 API calls 49938->49939 49940 48311a 49939->49940 49941 469868 SendMessageA 49940->49941 49942 483133 49941->49942 49943 483184 49942->49943 51273 479e18 23 API calls 49942->51273 51102 4241dc IsIconic 49943->51102 49947 48319f SetActiveWindow 49948 4831b4 49947->49948 51110 4824b4 49948->51110 49997->49695 49998->49679 49999->49679 50000->49679 52943 43d9c8 50001->52943 50004 494dcc 52948 431bd0 50004->52948 50005 494e52 50006 494e61 50005->50006 52981 4945c8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50005->52981 50006->49704 50015 494e16 52979 49465c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50015->52979 50017 494e2a 52980 433dd0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50017->52980 50019 494e4a 50019->49704 50020->49703 50022 457f41 50021->50022 50023 457f61 50022->50023 50024 4078f4 19 API calls 50022->50024 50026 403400 4 API calls 50023->50026 50025 457f59 50024->50025 50027 457d10 24 API calls 50025->50027 50028 457f76 50026->50028 50027->50023 50028->49722 50037->49704 50063 46c4bc 50038->50063 50041 414ae8 50042 414af6 50041->50042 50043 4034e0 4 API calls 50042->50043 50044 414b03 50043->50044 50044->49740 50045->49748 50047 46661a 50046->50047 50270 4078f4 50047->50270 50051 451448 50050->50051 50289 451300 50051->50289 50313 42cccc 50055->50313 50058 451458 50059 451428 4 API calls 50058->50059 50060 451474 50059->50060 50061 47efd0 42 API calls 50060->50061 50061->49750 50062->49766 50064 414ae8 4 API calls 50063->50064 50065 46c4f0 50064->50065 50124 466898 50065->50124 50069 46c502 50070 46c511 50069->50070 50074 46c52a 50069->50074 50193 47efd0 42 API calls 50070->50193 50072 403420 4 API calls 50073 46b702 50072->50073 50073->49736 50073->50041 50075 46c571 50074->50075 50077 46c558 50074->50077 50076 46c5d6 50075->50076 50090 46c575 50075->50090 50196 42cb4c CharNextA 50076->50196 50194 47efd0 42 API calls 50077->50194 50080 46c5e5 50081 46c5e9 50080->50081 50086 46c602 50080->50086 50197 47efd0 42 API calls 50081->50197 50083 46c5bd 50195 47efd0 42 API calls 50083->50195 50085 46c626 50198 47efd0 42 API calls 50085->50198 50086->50085 50138 466a08 50086->50138 50090->50083 50090->50086 50093 46c63f 50146 403778 50093->50146 50098 46c666 50199 466a94 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50098->50199 50099 46c697 50157 42c8cc 50099->50157 50103 46c679 50105 451458 4 API calls 50103->50105 50107 46c686 50105->50107 50200 47efd0 42 API calls 50107->50200 50111 46c525 50111->50072 50125 4668b2 50124->50125 50127 42cbc0 6 API calls 50125->50127 50128 403450 4 API calls 50125->50128 50129 406bb0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50125->50129 50130 4668fb 50125->50130 50203 42caac 50125->50203 50127->50125 50128->50125 50129->50125 50131 403420 4 API calls 50130->50131 50132 466915 50131->50132 50133 414b18 50132->50133 50134 414ae8 4 API calls 50133->50134 50135 414b3c 50134->50135 50136 403400 4 API calls 50135->50136 50137 414b6d 50136->50137 50137->50069 50139 466a12 50138->50139 50140 466a25 50139->50140 50223 42cb3c CharNextA 50139->50223 50140->50085 50142 466a38 50140->50142 50144 466a42 50142->50144 50143 466a6f 50143->50085 50143->50093 50144->50143 50224 42cb3c CharNextA 50144->50224 50147 4037aa 50146->50147 50149 40377d 50146->50149 50148 403400 4 API calls 50147->50148 50152 4037a0 50148->50152 50149->50147 50150 403791 50149->50150 50151 4034e0 4 API calls 50150->50151 50151->50152 50153 42c99c 50152->50153 50154 42c9f5 50153->50154 50155 42c9b2 50153->50155 50154->50098 50154->50099 50155->50154 50225 42cb3c CharNextA 50155->50225 50226 42c674 50157->50226 50160 42c8e0 50163 403400 4 API calls 50160->50163 50161 42c8e9 50162 403778 4 API calls 50161->50162 50164 42c8e7 50162->50164 50163->50164 50165 42c3fc 50164->50165 50166 42c406 50165->50166 50167 42c429 50165->50167 50238 42c97c CharPrevA 50166->50238 50169 403494 4 API calls 50167->50169 50171 42c432 50169->50171 50193->50111 50194->50111 50195->50111 50196->50080 50197->50111 50198->50111 50199->50103 50200->50111 50212 403494 50203->50212 50205 42cabc 50206 403744 4 API calls 50205->50206 50210 42caf2 50205->50210 50216 42c444 IsDBCSLeadByte 50205->50216 50206->50205 50208 42cb36 50208->50125 50210->50208 50217 4037b8 50210->50217 50222 42c444 IsDBCSLeadByte 50210->50222 50214 403498 50212->50214 50213 4034ba 50213->50205 50214->50213 50215 402660 4 API calls 50214->50215 50215->50213 50216->50205 50218 403744 4 API calls 50217->50218 50220 4037c6 50218->50220 50219 4037fc 50219->50210 50220->50219 50221 4038a4 4 API calls 50220->50221 50221->50219 50222->50210 50223->50139 50224->50144 50225->50155 50229 42c67c 50226->50229 50228 42c67b 50228->50160 50228->50161 50230 42c68d 50229->50230 50231 42c6f1 50230->50231 50235 42c6ab 50230->50235 50233 42c6ec 50231->50233 50237 42c444 IsDBCSLeadByte 50231->50237 50233->50228 50235->50233 50236 42c444 IsDBCSLeadByte 50235->50236 50236->50235 50237->50233 50273 407908 50270->50273 50274 407925 50273->50274 50281 4075b8 50274->50281 50277 407951 50279 4034e0 4 API calls 50277->50279 50280 407903 50279->50280 50280->49757 50285 4075d3 50281->50285 50282 4075e5 50282->50277 50286 4069a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50282->50286 50285->50282 50287 4076da 19 API calls 50285->50287 50288 4075ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50285->50288 50286->50277 50287->50285 50288->50285 50290 403400 4 API calls 50289->50290 50298 451331 50290->50298 50291 45135c 50292 403420 4 API calls 50291->50292 50294 451348 50299 40357c 50294->50299 50295 4034e0 4 API calls 50295->50298 50297 40357c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50297->50298 50298->50291 50298->50294 50298->50295 50298->50297 50314 42cbc0 6 API calls 50313->50314 50315 42ccee 50314->50315 50316 42ccf6 GetFileAttributesA 50315->50316 50317 403400 4 API calls 50316->50317 50318 42cd13 50317->50318 50318->49750 50318->50058 50319->49776 50322 46a787 50320->50322 50321 46abff 50324 46ac1a 50321->50324 50325 46ac4b 50321->50325 50322->50321 50323 46a842 50322->50323 50328 403494 4 API calls 50322->50328 50327 46a863 50323->50327 50333 46a8a4 50323->50333 50329 403494 4 API calls 50324->50329 50326 403494 4 API calls 50325->50326 50332 46ac59 50326->50332 50334 403494 4 API calls 50327->50334 50330 46a7c6 50328->50330 50331 46ac28 50329->50331 50336 414ae8 4 API calls 50330->50336 50432 46915c 12 API calls 50331->50432 50433 46915c 12 API calls 50332->50433 50338 403400 4 API calls 50333->50338 50335 46a871 50334->50335 50340 414ae8 4 API calls 50335->50340 50341 46a7e7 50336->50341 50342 46a8a2 50338->50342 50344 46a892 50340->50344 50406 403634 50341->50406 50364 46a988 50342->50364 50412 469868 50342->50412 50343 46ac36 50346 403400 4 API calls 50343->50346 50347 403634 4 API calls 50344->50347 50350 46ac7c 50346->50350 50347->50342 50355 403400 4 API calls 50350->50355 50351 46aa10 50353 403400 4 API calls 50351->50353 50357 46aa0e 50353->50357 50354 46a8c4 50358 46a902 50354->50358 50359 46a8ca 50354->50359 50360 46ac84 50355->50360 50427 469ca4 43 API calls 50357->50427 50361 403400 4 API calls 50358->50361 50362 403494 4 API calls 50359->50362 50363 403420 4 API calls 50360->50363 50366 46a900 50361->50366 50368 46a8d8 50362->50368 50369 46ac91 50363->50369 50364->50351 50365 46a9cf 50364->50365 50370 403494 4 API calls 50365->50370 50421 469b5c 50366->50421 50418 47c26c 50368->50418 50369->49782 50374 46a9dd 50370->50374 50379 414ae8 4 API calls 50374->50379 50376 46aa39 50383 46aa44 50376->50383 50384 46aa9a 50376->50384 50377 46a8f0 50378 403634 4 API calls 50377->50378 50378->50366 50381 46a9fe 50379->50381 50385 403634 4 API calls 50381->50385 50382 46a929 50388 46a934 50382->50388 50389 46a98a 50382->50389 50386 403494 4 API calls 50383->50386 50387 403400 4 API calls 50384->50387 50385->50357 50395 46aa52 50386->50395 50393 46aaa2 50387->50393 50391 403494 4 API calls 50388->50391 50390 403400 4 API calls 50389->50390 50390->50364 50392 46a942 50391->50392 50392->50364 50400 403634 4 API calls 50392->50400 50397 46ab4b 50393->50397 50428 494c90 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50393->50428 50395->50393 50399 403634 4 API calls 50395->50399 50401 46aa98 50395->50401 50396 46aac5 50396->50397 50429 494f3c 18 API calls 50396->50429 50430 4290f4 SendMessageA 50397->50430 50399->50395 50400->50392 50401->50393 50403 46abec 50431 429144 SendMessageA SendMessageA 50403->50431 50405->49784 50407 40363c 50406->50407 50408 4034bc 4 API calls 50407->50408 50409 40364f 50408->50409 50410 403450 4 API calls 50409->50410 50411 403677 50410->50411 50434 42a040 SendMessageA 50412->50434 50414 469877 50415 469897 50414->50415 50435 42a040 SendMessageA 50414->50435 50415->50354 50417 469887 50417->50354 50436 47c2b4 50418->50436 50423 469b89 50421->50423 50422 469beb 50424 403400 4 API calls 50422->50424 50423->50422 50781 469ae0 43 API calls 50423->50781 50425 469c00 50424->50425 50425->50382 50427->50376 50428->50396 50429->50397 50430->50403 50431->50321 50432->50343 50433->50343 50434->50414 50435->50417 50437 403494 4 API calls 50436->50437 50445 47c2e7 50437->50445 50438 47c3f9 50439 403420 4 API calls 50438->50439 50440 47c289 50439->50440 50440->50377 50441 4037b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50441->50445 50443 403778 4 API calls 50443->50445 50445->50438 50445->50441 50445->50443 50448 47b100 50445->50448 50692 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50445->50692 50693 403800 50445->50693 50697 42c97c CharPrevA 50445->50697 50449 47b152 50448->50449 50450 47b130 50448->50450 50451 47b172 50449->50451 50452 47b160 50449->50452 50450->50449 50702 47a030 19 API calls 50450->50702 50455 47b1d5 50451->50455 50456 47b180 50451->50456 50453 403494 4 API calls 50452->50453 50519 47b16d 50453->50519 50468 47b1f6 50455->50468 50469 47b1e3 50455->50469 50458 47b1af 50456->50458 50459 47b189 50456->50459 50457 403400 4 API calls 50462 47baf8 50457->50462 50461 47b1c2 50458->50461 50704 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50458->50704 50460 47b19c 50459->50460 50703 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50459->50703 50464 403494 4 API calls 50460->50464 50466 403494 4 API calls 50461->50466 50467 403400 4 API calls 50462->50467 50464->50519 50466->50519 50470 47bb00 50467->50470 50472 47b217 50468->50472 50473 47b204 50468->50473 50471 403494 4 API calls 50469->50471 50470->50445 50471->50519 50475 47b267 50472->50475 50476 47b225 50472->50476 50474 403494 4 API calls 50473->50474 50474->50519 50483 47b275 50475->50483 50484 47b288 50475->50484 50477 47b241 50476->50477 50478 47b22e 50476->50478 50480 47b254 50477->50480 50705 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50477->50705 50479 403494 4 API calls 50478->50479 50479->50519 50482 403494 4 API calls 50480->50482 50482->50519 50485 403494 4 API calls 50483->50485 50486 47b296 50484->50486 50487 47b2a9 50484->50487 50485->50519 50488 403494 4 API calls 50486->50488 50489 47b2b7 50487->50489 50490 47b2ca 50487->50490 50488->50519 50491 403494 4 API calls 50489->50491 50492 47b2eb 50490->50492 50493 47b2d8 50490->50493 50491->50519 50495 47b327 50492->50495 50496 47b2f9 50492->50496 50494 403494 4 API calls 50493->50494 50494->50519 50501 47b335 50495->50501 50502 47b364 50495->50502 50497 47b315 50496->50497 50498 47b302 50496->50498 50500 47c26c 43 API calls 50497->50500 50499 403494 4 API calls 50498->50499 50499->50519 50500->50519 50503 47b351 50501->50503 50504 47b33e 50501->50504 50507 47b372 50502->50507 50508 47b3a0 50502->50508 50506 403494 4 API calls 50503->50506 50505 403494 4 API calls 50504->50505 50505->50519 50506->50519 50509 47b38e 50507->50509 50510 47b37b 50507->50510 50513 47b3ae 50508->50513 50514 47b3dd 50508->50514 50512 47c26c 43 API calls 50509->50512 50511 403494 4 API calls 50510->50511 50511->50519 50512->50519 50515 47b3b7 50513->50515 50516 47b3ca 50513->50516 50520 47b3fe 50514->50520 50521 47b3eb 50514->50521 50518 403494 4 API calls 50515->50518 50517 403494 4 API calls 50516->50517 50517->50519 50518->50519 50519->50457 50523 47b41f 50520->50523 50524 47b40c 50520->50524 50522 403494 4 API calls 50521->50522 50522->50519 50526 47b42d 50523->50526 50527 47b458 50523->50527 50525 403494 4 API calls 50524->50525 50525->50519 50528 47b436 50526->50528 50529 47b449 50526->50529 50532 47b466 50527->50532 50533 47b491 50527->50533 50530 403494 4 API calls 50528->50530 50706 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50529->50706 50530->50519 50534 47b482 50532->50534 50535 47b46f 50532->50535 50538 47b4b1 50533->50538 50539 47b49f 50533->50539 50707 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50534->50707 50537 403494 4 API calls 50535->50537 50537->50519 50541 47b4d2 50538->50541 50542 47b4bf 50538->50542 50540 47c26c 43 API calls 50539->50540 50540->50519 50544 47b4e0 50541->50544 50545 47b4ed 50541->50545 50543 403494 4 API calls 50542->50543 50543->50519 50708 455560 GetComputerNameA 50544->50708 50547 47b4fb 50545->50547 50548 47b508 50545->50548 50692->50445 50694 403804 50693->50694 50696 40382f 50693->50696 50695 4038a4 4 API calls 50694->50695 50695->50696 50696->50445 50697->50445 50702->50450 50703->50460 50704->50461 50705->50480 50706->50519 50707->50519 50781->50423 50783 47dd19 50782->50783 50786 47dd56 50782->50786 50814 455d0c 50783->50814 50786->49790 50788 47dd6d 50788->49790 50933 466714 50789->50933 50792->49796 50794 42f56c 50793->50794 50795 42f58f GetActiveWindow GetFocus 50794->50795 50796 41eea4 2 API calls 50795->50796 50797 42f5a6 50796->50797 50798 42f5c3 50797->50798 50799 42f5b3 RegisterClassA 50797->50799 50800 42f652 SetFocus 50798->50800 50801 42f5d1 CreateWindowExA 50798->50801 50799->50798 50803 403400 4 API calls 50800->50803 50801->50800 50802 42f604 50801->50802 50964 42427c 50802->50964 50805 42f66e 50803->50805 50809 494f3c 18 API calls 50805->50809 50806 42f62c 50807 42f634 CreateWindowExA 50806->50807 50807->50800 50808 42f64a ShowWindow 50807->50808 50808->50800 50809->49835 50970 44b514 50810->50970 50812 466b3f 50812->49840 50815 455d1d 50814->50815 50816 455d21 50815->50816 50817 455d2a 50815->50817 50840 455a10 50816->50840 50848 455af0 29 API calls 50817->50848 50820 455d27 50820->50786 50821 47d970 50820->50821 50823 47d9b0 50821->50823 50825 47da6c 50821->50825 50822 403420 4 API calls 50824 47db4f 50822->50824 50823->50825 50831 47c26c 43 API calls 50823->50831 50836 47da0f 50823->50836 50838 47da18 50823->50838 50877 479770 50823->50877 50888 4798d4 50823->50888 50824->50788 50835 47dabd 50825->50835 50825->50836 50903 479630 50825->50903 50829 47c26c 43 API calls 50829->50835 50830 454100 20 API calls 50830->50835 50831->50823 50832 47c26c 43 API calls 50832->50838 50834 47da59 50834->50836 50835->50825 50835->50829 50835->50830 50835->50834 50836->50822 50838->50823 50838->50832 50838->50834 50892 42c92c 50838->50892 50897 42c954 50838->50897 50902 47d67c 52 API calls 50838->50902 50849 42de1c 50840->50849 50842 455a2d 50843 455a7b 50842->50843 50852 455944 50842->50852 50843->50820 50846 455944 6 API calls 50847 455a5c RegCloseKey 50846->50847 50847->50820 50848->50820 50850 42de27 50849->50850 50851 42de2d RegOpenKeyExA 50849->50851 50850->50851 50851->50842 50857 42dd58 50852->50857 50854 403420 4 API calls 50855 4559f6 50854->50855 50855->50846 50856 45596c 50856->50854 50860 42dc00 50857->50860 50861 42dc26 RegQueryValueExA 50860->50861 50866 42dc49 50861->50866 50876 42dc6b 50861->50876 50862 403400 4 API calls 50864 42dd37 50862->50864 50863 42dc63 50865 403400 4 API calls 50863->50865 50864->50856 50865->50876 50866->50863 50867 4034e0 4 API calls 50866->50867 50868 403744 4 API calls 50866->50868 50866->50876 50867->50866 50869 42dca0 RegQueryValueExA 50868->50869 50869->50861 50871 42dcbc 50869->50871 50870 4038a4 4 API calls 50872 42dcfe 50870->50872 50871->50870 50871->50876 50873 42dd10 50872->50873 50875 403744 4 API calls 50872->50875 50874 403450 4 API calls 50873->50874 50874->50876 50875->50873 50876->50862 50878 479786 50877->50878 50879 479782 50877->50879 50880 403450 4 API calls 50878->50880 50879->50823 50881 479793 50880->50881 50882 4797b3 50881->50882 50883 479799 50881->50883 50884 479630 19 API calls 50882->50884 50885 479630 19 API calls 50883->50885 50886 4797af 50884->50886 50885->50886 50887 403400 4 API calls 50886->50887 50887->50879 50889 4798e0 50888->50889 50890 4798fb 50889->50890 50915 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50889->50915 50890->50823 50916 42c79c 50892->50916 50895 403778 4 API calls 50896 42c94e 50895->50896 50896->50838 50898 42c79c IsDBCSLeadByte 50897->50898 50899 42c964 50898->50899 50900 403778 4 API calls 50899->50900 50901 42c975 50900->50901 50901->50838 50902->50838 50904 47964b 50903->50904 50905 47970a 50904->50905 50908 47967c 50904->50908 50928 4794e4 19 API calls 50904->50928 50905->50825 50907 4796a1 50911 4796c2 50907->50911 50930 4794e4 19 API calls 50907->50930 50908->50907 50929 4794e4 19 API calls 50908->50929 50911->50905 50912 479702 50911->50912 50931 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50911->50931 50922 479368 50912->50922 50915->50890 50917 42c67c IsDBCSLeadByte 50916->50917 50919 42c7b1 50917->50919 50918 42c7fb 50918->50895 50919->50918 50921 42c444 IsDBCSLeadByte 50919->50921 50921->50919 50923 4793a3 50922->50923 50924 403450 4 API calls 50923->50924 50925 4793c8 50924->50925 50932 477a58 19 API calls 50925->50932 50927 479409 50927->50905 50928->50908 50929->50907 50930->50911 50931->50912 50932->50927 50934 403494 4 API calls 50933->50934 50935 466742 50934->50935 50950 42dbc8 50935->50950 50938 42dbc8 5 API calls 50939 466766 50938->50939 50940 466600 19 API calls 50939->50940 50941 466770 50940->50941 50942 42dbc8 5 API calls 50941->50942 50943 46677f 50942->50943 50953 466678 50943->50953 50946 42dbc8 5 API calls 50947 466798 50946->50947 50948 403400 4 API calls 50947->50948 50949 4667ad 50948->50949 50949->49793 50957 42db10 50950->50957 50954 466698 50953->50954 50955 4078f4 19 API calls 50954->50955 50956 4666e2 50955->50956 50956->50946 50958 42dbbb 50957->50958 50962 42db30 50957->50962 50958->50938 50959 4037b8 4 API calls 50959->50962 50961 403800 4 API calls 50961->50962 50962->50958 50962->50959 50962->50961 50963 42c444 IsDBCSLeadByte 50962->50963 50963->50962 50965 4242ae 50964->50965 50966 42428e GetWindowTextA 50964->50966 50968 403494 4 API calls 50965->50968 50967 4034e0 4 API calls 50966->50967 50969 4242ac 50967->50969 50968->50969 50969->50806 50973 44b38c 50970->50973 50972 44b527 50972->50812 50974 44b3bf 50973->50974 50975 414ae8 4 API calls 50974->50975 50978 44b3d2 50975->50978 50976 44b3ff GetDC 50979 41a1e8 5 API calls 50976->50979 50977 40357c 4 API calls 50977->50976 50978->50976 50978->50977 50980 44b41f SelectObject 50979->50980 50981 44b430 50980->50981 50984 44b0c0 50981->50984 50983 44b444 ReleaseDC 50983->50972 50985 44b0d7 50984->50985 50986 44b16a 50985->50986 50987 44b153 50985->50987 50988 44b0ea 50985->50988 50986->50983 50989 44b163 DrawTextA 50987->50989 50988->50986 50990 402648 4 API calls 50988->50990 50989->50986 50991 44b0fb 50990->50991 50992 44b119 MultiByteToWideChar DrawTextW 50991->50992 50993 402660 4 API calls 50992->50993 50994 44b14b 50993->50994 50994->50983 50997 4652d7 50995->50997 50996 4653b2 51006 46708c 50996->51006 50997->50996 51001 465327 50997->51001 51018 421a1c 50997->51018 50998 46536a 50998->50996 51024 4185b8 7 API calls 50998->51024 51001->50998 51002 465361 51001->51002 51003 46536c 51001->51003 51004 421a1c 7 API calls 51002->51004 51005 421a1c 7 API calls 51003->51005 51004->50998 51005->50998 51007 4670bc 51006->51007 51008 46709d 51006->51008 51007->49855 51009 414b18 4 API calls 51008->51009 51010 4670ab 51009->51010 51011 414b18 4 API calls 51010->51011 51011->51007 51014 46ad09 51012->51014 51013 421a1c 7 API calls 51015 46ad94 51013->51015 51014->51013 51015->49878 51016 466b60 18 API calls 51015->51016 51016->49878 51017->49880 51019 421a74 51018->51019 51021 421a2a 51018->51021 51019->51001 51020 421a59 51020->51019 51025 421d28 SetFocus GetFocus 51020->51025 51021->51020 51022 408cbc 5 API calls 51021->51022 51022->51020 51024->50996 51025->51019 51074 46c7a5 51073->51074 51075 46c7f2 51074->51075 51076 414ae8 4 API calls 51074->51076 51077 403420 4 API calls 51075->51077 51078 46c7bb 51076->51078 51079 46c89c 51077->51079 51280 466924 6 API calls 51078->51280 51079->49935 51272 408be0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51079->51272 51081 46c7c3 51082 414b18 4 API calls 51081->51082 51083 46c7d1 51082->51083 51084 46c7de 51083->51084 51086 46c7f7 51083->51086 51281 47efd0 42 API calls 51084->51281 51087 46c80f 51086->51087 51088 466a08 CharNextA 51086->51088 51282 47efd0 42 API calls 51087->51282 51090 46c80b 51088->51090 51090->51087 51091 46c825 51090->51091 51092 46c841 51091->51092 51093 46c82b 51091->51093 51095 42c99c CharNextA 51092->51095 51283 47efd0 42 API calls 51093->51283 51096 46c84e 51095->51096 51096->51075 51284 466a94 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51096->51284 51098 46c865 51099 451458 4 API calls 51098->51099 51100 46c872 51099->51100 51285 47efd0 42 API calls 51100->51285 51103 424223 51102->51103 51104 4241ed SetActiveWindow 51102->51104 51103->49947 51103->49948 51286 42364c 51104->51286 51108 42420a 51108->51103 51109 42421d SetFocus 51108->51109 51109->51103 51111 482505 51110->51111 51112 4824d7 51110->51112 51114 475bd0 51111->51114 51299 494cec 18 API calls 51112->51299 51300 457d10 51114->51300 51118 475c26 51324 46e308 51118->51324 51273->49943 51280->51081 51281->51075 51282->51075 51283->51075 51284->51098 51285->51075 51295 4235f8 SystemParametersInfoA 51286->51295 51288 423665 ShowWindow 51291 423670 51288->51291 51292 423677 51288->51292 51298 423628 SystemParametersInfoA 51291->51298 51294 423b14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 51292->51294 51294->51108 51296 423616 51295->51296 51296->51288 51297 423628 SystemParametersInfoA 51296->51297 51297->51288 51298->51292 51299->51111 51301 457e44 51300->51301 51302 457d3c 51300->51302 51303 457e95 51301->51303 51776 45757c 6 API calls 51301->51776 51772 457a0c GetSystemTimeAsFileTime FileTimeToSystemTime 51302->51772 51306 403400 4 API calls 51303->51306 51308 457eaa 51306->51308 51307 457d44 51309 4078f4 19 API calls 51307->51309 51321 4072a8 51308->51321 51310 457db5 51309->51310 51773 457d00 20 API calls 51310->51773 51312 403778 4 API calls 51316 457dbd 51312->51316 51313 457e0b 51314 457e3a 51313->51314 51318 403778 4 API calls 51313->51318 51775 457d00 20 API calls 51314->51775 51316->51312 51316->51313 51317 457d00 20 API calls 51316->51317 51317->51316 51319 457e32 51318->51319 51774 457d00 20 API calls 51319->51774 51777 403738 51321->51777 51325 46e37b 51324->51325 51327 46e325 51324->51327 51328 46e380 51325->51328 51326 479770 19 API calls 51326->51327 51327->51325 51327->51326 51329 46e3a6 51328->51329 51779 44fb1c 51329->51779 51772->51307 51773->51316 51774->51314 51775->51301 51776->51303 51778 40373c SetCurrentDirectoryA 51777->51778 51778->51118 51782 44fb30 51779->51782 51783 44fb41 51782->51783 52982 431eec 52943->52982 52945 43d9f2 52946 403400 4 API calls 52945->52946 52947 43da76 52946->52947 52947->50004 52947->50005 52949 431bd6 52948->52949 52950 402648 4 API calls 52949->52950 52951 431c06 52950->52951 52952 4947f8 52951->52952 52953 4948cd 52952->52953 52956 494812 52952->52956 52959 494910 52953->52959 52954 433d6c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52954->52956 52956->52953 52956->52954 52958 403450 4 API calls 52956->52958 52987 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52956->52987 52988 431ca0 52956->52988 52958->52956 52960 49492c 52959->52960 52996 433d6c 52960->52996 52962 494931 52963 431ca0 4 API calls 52962->52963 52964 49493c 52963->52964 52965 43d594 52964->52965 52966 43d5c1 52965->52966 52971 43d5b3 52965->52971 52966->50015 52967 43d63d 52978 43d6f7 52967->52978 52999 447084 52967->52999 52969 43d688 53005 43dd50 52969->53005 52971->52966 52971->52967 52972 447084 4 API calls 52971->52972 52972->52971 52973 43d8fd 52973->52966 53025 447024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52973->53025 52975 43d8de 53024 447024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52975->53024 52978->52973 52978->52975 53023 447024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52978->53023 52979->50017 52980->50019 52981->50006 52983 403494 4 API calls 52982->52983 52984 431efb 52983->52984 52985 431f25 52984->52985 52986 403744 4 API calls 52984->52986 52985->52945 52986->52984 52987->52956 52989 431cae 52988->52989 52992 431cc0 52988->52992 52994 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52989->52994 52991 431ce2 52991->52956 52992->52991 52995 431c40 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52992->52995 52994->52992 52995->52991 52997 402648 4 API calls 52996->52997 52998 433d7b 52997->52998 52998->52962 53000 4470a3 52999->53000 53001 4470aa 52999->53001 53026 446e30 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53000->53026 53003 431ca0 4 API calls 53001->53003 53004 4470ba 53003->53004 53004->52969 53006 43dd6c 53005->53006 53012 43dd99 53005->53012 53007 402660 4 API calls 53006->53007 53006->53012 53007->53006 53008 43ddce 53008->52978 53010 43fea5 53010->53008 53036 447024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53010->53036 53011 447024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53011->53012 53012->53008 53012->53010 53012->53011 53014 43c938 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53012->53014 53016 431c40 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53012->53016 53019 433d18 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53012->53019 53020 433b18 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53012->53020 53021 436650 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53012->53021 53022 446e30 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53012->53022 53027 4396e0 53012->53027 53033 436e4c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53012->53033 53034 43dc48 18 API calls 53012->53034 53035 433d34 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53012->53035 53014->53012 53016->53012 53019->53012 53020->53012 53021->53012 53022->53012 53023->52978 53024->52973 53025->52973 53026->53001 53028 4396e9 53027->53028 53028->53028 53029 403400 4 API calls 53028->53029 53030 43c8e8 53029->53030 53037 403a38 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53030->53037 53032 43c8fa 53032->53012 53033->53012 53034->53012 53035->53012 53036->53010 53037->53032 53039 41fb58 53040 41fb61 53039->53040 53043 41fdfc 53040->53043 53042 41fb6e 53044 41feee 53043->53044 53045 41fe13 53043->53045 53044->53042 53045->53044 53064 41f9bc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 53045->53064 53047 41fe49 53048 41fe73 53047->53048 53049 41fe4d 53047->53049 53074 41f9bc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 53048->53074 53065 41fb9c 53049->53065 53052 41fe81 53054 41fe85 53052->53054 53055 41feab 53052->53055 53057 41fb9c 10 API calls 53054->53057 53058 41fb9c 10 API calls 53055->53058 53056 41fb9c 10 API calls 53063 41fe71 53056->53063 53059 41fe97 53057->53059 53060 41febd 53058->53060 53061 41fb9c 10 API calls 53059->53061 53062 41fb9c 10 API calls 53060->53062 53061->53063 53062->53063 53063->53042 53064->53047 53066 41fbb7 53065->53066 53067 41f93c 4 API calls 53066->53067 53068 41fbcd 53066->53068 53067->53068 53075 41f93c 53068->53075 53070 41fc15 53071 41fc38 SetScrollInfo 53070->53071 53083 41fa9c 53071->53083 53074->53052 53076 4181e0 53075->53076 53077 41f959 GetWindowLongA 53076->53077 53078 41f996 53077->53078 53079 41f976 53077->53079 53095 41f8c8 GetWindowLongA GetSystemMetrics GetSystemMetrics 53078->53095 53094 41f8c8 GetWindowLongA GetSystemMetrics GetSystemMetrics 53079->53094 53082 41f982 53082->53070 53084 41fab2 53083->53084 53085 41faaa 53083->53085 53086 41faef 53084->53086 53087 41faf1 53084->53087 53088 41fae1 53084->53088 53085->53056 53089 41fb31 GetScrollPos 53086->53089 53097 417e48 IsWindowVisible ScrollWindow SetWindowPos 53087->53097 53096 417e48 IsWindowVisible ScrollWindow SetWindowPos 53088->53096 53089->53085 53092 41fb3c 53089->53092 53093 41fb4b SetScrollPos 53092->53093 53093->53085 53094->53082 53095->53082 53096->53086 53097->53086 53098 420598 53099 4205ab 53098->53099 53119 415b30 53099->53119 53101 4205e6 53102 4206f2 53101->53102 53103 420651 53101->53103 53112 420642 MulDiv 53101->53112 53106 420709 53102->53106 53126 4146d4 KiUserCallbackDispatcher 53102->53126 53124 420848 20 API calls 53103->53124 53105 420720 53109 420742 53105->53109 53128 420060 12 API calls 53105->53128 53106->53105 53127 414718 KiUserCallbackDispatcher 53106->53127 53111 42066a 53111->53102 53125 420060 12 API calls 53111->53125 53123 41a304 LocalAlloc TlsSetValue TlsGetValue TlsGetValue DeleteObject 53112->53123 53115 420687 53116 4206a3 MulDiv 53115->53116 53117 4206c6 53115->53117 53116->53117 53117->53102 53118 4206cf MulDiv 53117->53118 53118->53102 53120 415b42 53119->53120 53129 414470 53120->53129 53122 415b5a 53122->53101 53123->53103 53124->53111 53125->53115 53126->53106 53127->53105 53128->53109 53130 41448a 53129->53130 53133 410458 53130->53133 53132 4144a0 53132->53122 53136 40dca4 53133->53136 53135 41045e 53135->53132 53137 40dd06 53136->53137 53138 40dcb7 53136->53138 53143 40dd14 53137->53143 53141 40dd14 19 API calls 53138->53141 53142 40dce1 53141->53142 53142->53135 53144 40dd24 53143->53144 53146 40dd3a 53144->53146 53155 40e09c 53144->53155 53171 40d5e0 53144->53171 53174 40df4c 53146->53174 53149 40d5e0 5 API calls 53150 40dd42 53149->53150 53150->53149 53151 40ddae 53150->53151 53177 40db60 53150->53177 53152 40df4c 5 API calls 53151->53152 53154 40dd10 53152->53154 53154->53135 53191 40e96c 53155->53191 53157 403778 4 API calls 53159 40e0d7 53157->53159 53158 40e18d 53160 40e1b7 53158->53160 53161 40e1a8 53158->53161 53159->53157 53159->53158 53254 40d774 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53159->53254 53255 40e080 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53159->53255 53251 40ba24 53160->53251 53200 40e3c0 53161->53200 53167 40e1b5 53168 403400 4 API calls 53167->53168 53169 40e25c 53168->53169 53169->53144 53172 40ea08 5 API calls 53171->53172 53173 40d5ea 53172->53173 53173->53144 53288 40d4bc 53174->53288 53297 40df54 53177->53297 53180 40e96c 5 API calls 53181 40db9e 53180->53181 53182 40e96c 5 API calls 53181->53182 53183 40dba9 53182->53183 53184 40dbc4 53183->53184 53185 40dbbb 53183->53185 53189 40dbc1 53183->53189 53304 40d9d8 53184->53304 53307 40dac8 19 API calls 53185->53307 53188 403420 4 API calls 53190 40dc8f 53188->53190 53189->53188 53190->53150 53257 40d780 53191->53257 53194 4034e0 4 API calls 53195 40e98f 53194->53195 53196 403744 4 API calls 53195->53196 53197 40e996 53196->53197 53198 40d780 5 API calls 53197->53198 53199 40e9a4 53198->53199 53199->53159 53201 40e3f6 53200->53201 53202 40e3ec 53200->53202 53204 40e511 53201->53204 53205 40e495 53201->53205 53206 40e4f6 53201->53206 53207 40e576 53201->53207 53208 40e438 53201->53208 53209 40e4d9 53201->53209 53210 40e47a 53201->53210 53211 40e4bb 53201->53211 53242 40e45c 53201->53242 53262 40d440 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53202->53262 53212 40d764 5 API calls 53204->53212 53270 40de24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53205->53270 53275 40e890 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53206->53275 53216 40d764 5 API calls 53207->53216 53263 40d764 53208->53263 53273 40e9a8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53209->53273 53269 40d818 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53210->53269 53272 40dde4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53211->53272 53221 40e519 53212->53221 53215 403400 4 API calls 53222 40e5eb 53215->53222 53223 40e57e 53216->53223 53227 40e523 53221->53227 53228 40e51d 53221->53228 53222->53167 53229 40e582 53223->53229 53230 40e59b 53223->53230 53224 40e4e4 53274 409d38 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53224->53274 53226 40e4a0 53271 40d470 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53226->53271 53276 40ea08 53227->53276 53236 40e521 53228->53236 53237 40e53c 53228->53237 53239 40ea08 5 API calls 53229->53239 53282 40de24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53230->53282 53232 40e461 53268 40ded8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53232->53268 53233 40e444 53266 40de24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53233->53266 53280 40de24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53236->53280 53243 40ea08 5 API calls 53237->53243 53239->53242 53242->53215 53246 40e544 53243->53246 53244 40e44f 53267 40e26c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53244->53267 53279 40d8a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53246->53279 53248 40e566 53281 40e2d4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53248->53281 53283 40b9d0 53251->53283 53254->53159 53255->53159 53256 40d774 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53256->53167 53260 40d78b 53257->53260 53258 40d7c5 53258->53194 53260->53258 53261 40d7cc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53260->53261 53261->53260 53262->53201 53264 40ea08 5 API calls 53263->53264 53265 40d76e 53264->53265 53265->53232 53265->53233 53266->53244 53267->53242 53268->53242 53269->53242 53270->53226 53271->53242 53272->53242 53273->53224 53274->53242 53275->53242 53277 40d780 5 API calls 53276->53277 53278 40ea15 53277->53278 53278->53242 53279->53242 53280->53248 53281->53242 53282->53242 53284 40b9e2 53283->53284 53286 40ba07 53283->53286 53284->53286 53287 40ba84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53284->53287 53286->53167 53286->53256 53287->53286 53289 40ea08 5 API calls 53288->53289 53290 40d4c9 53289->53290 53291 40d4dc 53290->53291 53295 40eb0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53290->53295 53291->53150 53293 40d4d7 53296 40d458 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53293->53296 53295->53293 53296->53291 53298 40d764 5 API calls 53297->53298 53299 40df6b 53298->53299 53300 40ea08 5 API calls 53299->53300 53303 40db93 53299->53303 53301 40df78 53300->53301 53301->53303 53308 40ded8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53301->53308 53303->53180 53309 40ab7c 19 API calls 53304->53309 53306 40da00 53306->53189 53307->53189 53308->53303 53309->53306 55541 41363c SetWindowLongA GetWindowLongA 55542 413699 SetPropA SetPropA 55541->55542 55543 41367b GetWindowLongA 55541->55543 55548 41f39c 55542->55548 55543->55542 55544 41368a SetWindowLongA 55543->55544 55544->55542 55553 423c0c 55548->55553 55647 423a84 55548->55647 55654 415270 55548->55654 55549 4136e9 55556 423c42 55553->55556 55574 423c63 55556->55574 55661 423b68 55556->55661 55557 423cec 55559 423cf3 55557->55559 55560 423d27 55557->55560 55558 423c8d 55561 423c93 55558->55561 55562 423d50 55558->55562 55567 423cf9 55559->55567 55606 423fb1 55559->55606 55563 423d32 55560->55563 55564 42409a IsIconic 55560->55564 55568 423cc5 55561->55568 55569 423c98 55561->55569 55565 423d62 55562->55565 55566 423d6b 55562->55566 55572 4240d6 55563->55572 55573 423d3b 55563->55573 55564->55574 55578 4240ae GetFocus 55564->55578 55575 423d78 55565->55575 55576 423d69 55565->55576 55668 424194 11 API calls 55566->55668 55579 423f13 SendMessageA 55567->55579 55580 423d07 55567->55580 55568->55574 55596 423cde 55568->55596 55597 423e3f 55568->55597 55570 423df6 55569->55570 55571 423c9e 55569->55571 55673 423b84 NtdllDefWindowProc_A 55570->55673 55585 423ca7 55571->55585 55586 423e1e PostMessageA 55571->55586 55682 424850 WinHelpA PostMessageA 55572->55682 55582 4240ed 55573->55582 55598 423cc0 55573->55598 55574->55549 55583 4241dc 11 API calls 55575->55583 55669 423b84 NtdllDefWindowProc_A 55576->55669 55578->55574 55584 4240bf 55578->55584 55579->55574 55580->55574 55580->55598 55626 423f56 55580->55626 55594 4240f6 55582->55594 55595 42410b 55582->55595 55583->55574 55681 41eff4 GetCurrentThreadId EnumThreadWindows 55584->55681 55591 423cb0 55585->55591 55592 423ea5 55585->55592 55674 423b84 NtdllDefWindowProc_A 55586->55674 55601 423cb9 55591->55601 55602 423dce IsIconic 55591->55602 55603 423eae 55592->55603 55604 423edf 55592->55604 55593 423e39 55593->55574 55605 4244d4 5 API calls 55594->55605 55683 42452c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 55595->55683 55596->55598 55607 423e0b 55596->55607 55665 423b84 NtdllDefWindowProc_A 55597->55665 55598->55574 55667 423b84 NtdllDefWindowProc_A 55598->55667 55600 4240c6 55600->55574 55612 4240ce SetFocus 55600->55612 55601->55598 55613 423d91 55601->55613 55615 423dea 55602->55615 55616 423dde 55602->55616 55676 423b14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 55603->55676 55666 423b84 NtdllDefWindowProc_A 55604->55666 55605->55574 55606->55574 55623 423fd7 IsWindowEnabled 55606->55623 55610 424178 12 API calls 55607->55610 55610->55574 55611 423e45 55620 423e83 55611->55620 55621 423e61 55611->55621 55612->55574 55613->55574 55670 422c4c ShowWindow PostMessageA PostQuitMessage 55613->55670 55672 423b84 NtdllDefWindowProc_A 55615->55672 55671 423bc0 15 API calls 55616->55671 55619 423ee5 55625 423efd 55619->55625 55632 41eea4 2 API calls 55619->55632 55628 423a84 6 API calls 55620->55628 55675 423b14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 55621->55675 55622 423eb6 55630 423ec8 55622->55630 55637 41ef58 6 API calls 55622->55637 55623->55574 55631 423fe5 55623->55631 55633 423a84 6 API calls 55625->55633 55626->55574 55634 423f78 IsWindowEnabled 55626->55634 55636 423e8b PostMessageA 55628->55636 55677 423b84 NtdllDefWindowProc_A 55630->55677 55640 423fec IsWindowVisible 55631->55640 55632->55625 55633->55574 55634->55574 55639 423f86 55634->55639 55635 423e69 PostMessageA 55635->55574 55636->55574 55637->55630 55678 412310 7 API calls 55639->55678 55640->55574 55642 423ffa GetFocus 55640->55642 55643 4181e0 55642->55643 55644 42400f SetFocus 55643->55644 55679 415240 55644->55679 55648 423a94 55647->55648 55650 423b0d 55647->55650 55649 423a9a EnumWindows 55648->55649 55648->55650 55649->55650 55651 423ab6 GetWindow GetWindowLongA 55649->55651 55684 423a1c GetWindow 55649->55684 55650->55549 55652 423ad5 55651->55652 55652->55650 55653 423b01 SetWindowPos 55652->55653 55653->55650 55653->55652 55655 41527d 55654->55655 55656 4152e3 55655->55656 55657 4152d8 55655->55657 55660 4152e1 55655->55660 55687 424b8c 13 API calls 55656->55687 55657->55660 55688 41505c 46 API calls 55657->55688 55660->55549 55662 423b72 55661->55662 55663 423b7d 55661->55663 55662->55663 55664 408720 7 API calls 55662->55664 55663->55557 55663->55558 55664->55663 55665->55611 55666->55619 55667->55574 55668->55574 55669->55574 55670->55574 55671->55574 55672->55574 55673->55574 55674->55593 55675->55635 55676->55622 55677->55574 55678->55574 55680 41525b SetFocus 55679->55680 55680->55574 55681->55600 55682->55593 55683->55593 55685 423a3d GetWindowLongA 55684->55685 55686 423a49 55684->55686 55685->55686 55687->55660 55688->55660 55689 4809f7 55690 480a00 55689->55690 55691 480a2b 55689->55691 55690->55691 55692 480a1d 55690->55692 55694 480a6a 55691->55694 56063 47f4a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55691->56063 56061 476c50 189 API calls 55692->56061 55695 480a8e 55694->55695 55699 480a81 55694->55699 55700 480a83 55694->55700 55702 480aca 55695->55702 55703 480aac 55695->55703 55697 480a22 55697->55691 56062 408be0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 55697->56062 55698 480a5d 56064 47f50c 42 API calls 55698->56064 55706 47f4e8 42 API calls 55699->55706 56065 47f57c 42 API calls 55700->56065 56068 47f33c 24 API calls 55702->56068 55707 480ac1 55703->55707 56066 47f50c 42 API calls 55703->56066 55706->55695 56067 47f33c 24 API calls 55707->56067 55709 480ac8 55712 480ada 55709->55712 55713 480ae0 55709->55713 55714 480ade 55712->55714 55717 47f4e8 42 API calls 55712->55717 55713->55714 55715 47f4e8 42 API calls 55713->55715 55815 47c66c 55714->55815 55715->55714 55717->55714 55718 480b07 55889 47cb94 55718->55889 55816 42d898 GetWindowsDirectoryA 55815->55816 55817 47c690 55816->55817 55818 403450 4 API calls 55817->55818 55819 47c69d 55818->55819 55820 42d8c4 GetSystemDirectoryA 55819->55820 55821 47c6a5 55820->55821 55822 403450 4 API calls 55821->55822 55823 47c6b2 55822->55823 55824 42d8f0 6 API calls 55823->55824 55825 47c6ba 55824->55825 55826 403450 4 API calls 55825->55826 55827 47c6c7 55826->55827 55828 47c6d0 55827->55828 55829 47c6ec 55827->55829 56100 42d208 55828->56100 55830 403400 4 API calls 55829->55830 55833 47c6ea 55830->55833 55835 47c731 55833->55835 55836 42c8cc 5 API calls 55833->55836 55834 403450 4 API calls 55834->55833 56080 47c4f4 55835->56080 55838 47c70c 55836->55838 55841 403450 4 API calls 55838->55841 55840 403450 4 API calls 55842 47c74d 55840->55842 55843 47c719 55841->55843 55844 47c76b 55842->55844 55845 4035c0 4 API calls 55842->55845 55843->55835 55847 403450 4 API calls 55843->55847 55846 47c4f4 8 API calls 55844->55846 55845->55844 55848 47c77a 55846->55848 55847->55835 55849 403450 4 API calls 55848->55849 55850 47c787 55849->55850 55851 47c7af 55850->55851 55852 42c3fc 5 API calls 55850->55852 55853 47c816 55851->55853 55856 47c4f4 8 API calls 55851->55856 55854 47c79d 55852->55854 55855 47c8de 55853->55855 55861 47c836 SHGetKnownFolderPath 55853->55861 55860 4035c0 4 API calls 55854->55860 55858 47c8e7 55855->55858 55859 47c908 55855->55859 55857 47c7c7 55856->55857 55862 403450 4 API calls 55857->55862 55863 42c3fc 5 API calls 55858->55863 55864 42c3fc 5 API calls 55859->55864 55860->55851 55865 47c850 55861->55865 55866 47c88b SHGetKnownFolderPath 55861->55866 55868 47c7d4 55862->55868 55870 47c8f4 55863->55870 55871 47c915 55864->55871 56110 403ba4 7 API calls 55865->56110 55866->55855 55869 47c8a5 55866->55869 55873 47c7e7 55868->55873 56108 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55868->56108 56111 403ba4 7 API calls 55869->56111 55875 4035c0 4 API calls 55870->55875 55876 4035c0 4 API calls 55871->55876 55872 47c86b CoTaskMemFree 55872->55718 55880 47c4f4 8 API calls 55873->55880 55877 47c906 55875->55877 55876->55877 56091 47c5d8 55877->56091 55879 47c8c0 CoTaskMemFree 55879->55718 55882 47c7f6 55880->55882 55884 403450 4 API calls 55882->55884 55886 47c803 55884->55886 55886->55853 56109 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55886->56109 55890 47cb9c 55889->55890 55890->55890 56113 453a24 55890->56113 56061->55697 56063->55698 56064->55694 56065->55695 56066->55707 56067->55709 56068->55709 56081 42de1c RegOpenKeyExA 56080->56081 56082 47c51a 56081->56082 56083 47c540 56082->56083 56084 47c51e 56082->56084 56085 403400 4 API calls 56083->56085 56086 42dd4c 6 API calls 56084->56086 56087 47c547 56085->56087 56088 47c52a 56086->56088 56087->55840 56089 47c535 RegCloseKey 56088->56089 56090 403400 4 API calls 56088->56090 56089->56087 56090->56089 56092 47c5e6 56091->56092 56093 42de1c RegOpenKeyExA 56092->56093 56101 4038a4 4 API calls 56100->56101 56102 42d21b 56101->56102 56103 42d232 GetEnvironmentVariableA 56102->56103 56107 42d245 56102->56107 56112 42dbd0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56102->56112 56103->56102 56104 42d23e 56103->56104 56105 403400 4 API calls 56104->56105 56105->56107 56107->55834 56108->55873 56109->55853 56110->55872 56111->55879 56112->56102 56116 453a44 56113->56116
                                                                                              Strings
                                                                                              • Will register the file (a DLL/OCX) later., xrefs: 0047151F
                                                                                              • Failed to read existing file's SHA-1 hash. Proceeding., xrefs: 00470CD0
                                                                                              • Same version. Skipping., xrefs: 00470CE5
                                                                                              • Stripped read-only attribute., xrefs: 00470EC7
                                                                                              • Dest filename: %s, xrefs: 00470894
                                                                                              • Non-default bitness: 64-bit, xrefs: 004708AF
                                                                                              • Existing file's SHA-1 hash matches our file. Skipping., xrefs: 00470CB5
                                                                                              • Installing the file., xrefs: 00470F09
                                                                                              • Incrementing shared file count (32-bit)., xrefs: 004715A5
                                                                                              • User opted not to overwrite the existing file. Skipping., xrefs: 00470E4D
                                                                                              • Non-default bitness: 32-bit, xrefs: 004708BB
                                                                                              • Skipping due to "onlyifdoesntexist" flag., xrefs: 004709CE
                                                                                              • Existing file has a later time stamp. Skipping., xrefs: 00470DCF
                                                                                              • Version of existing file: (none), xrefs: 00470CFA
                                                                                              • Will register the file (a type library) later., xrefs: 00471513
                                                                                              • Same time stamp. Skipping., xrefs: 00470D55
                                                                                              • Time stamp of our file: (failed to read), xrefs: 004709A7
                                                                                              • Existing file is protected by Windows File Protection. Skipping., xrefs: 00470DEC
                                                                                              • Version of our file: (none), xrefs: 00470AFC
                                                                                              • Existing file's SHA-1 hash is different from our file. Proceeding., xrefs: 00470CC4
                                                                                              • Dest file is protected by Windows File Protection., xrefs: 004708ED
                                                                                              • Failed to strip read-only attribute., xrefs: 00470ED3
                                                                                              • Existing file is a newer version. Skipping., xrefs: 00470C02
                                                                                              • Installing into GAC, xrefs: 00471714
                                                                                              • -- File entry --, xrefs: 004706FB
                                                                                              • .tmp, xrefs: 00470FB7
                                                                                              • Time stamp of existing file: %s, xrefs: 00470A2B
                                                                                              • Couldn't read time stamp. Skipping., xrefs: 00470D35
                                                                                              • @, xrefs: 004707B0
                                                                                              • Incrementing shared file count (64-bit)., xrefs: 0047158C
                                                                                              • Uninstaller requires administrator: %s, xrefs: 0047118F
                                                                                              • Time stamp of our file: %s, xrefs: 0047099B
                                                                                              • Version of existing file: %u.%u.%u.%u, xrefs: 00470B7C
                                                                                              • User opted not to strip the existing file's read-only attribute. Skipping., xrefs: 00470E96
                                                                                              • Skipping due to "onlyifdestfileexists" flag., xrefs: 00470EFA
                                                                                              • InUn, xrefs: 0047115F
                                                                                              • , xrefs: 00470BCF, 00470DA0, 00470E1E
                                                                                              • Version of our file: %u.%u.%u.%u, xrefs: 00470AF0
                                                                                              • Dest file exists., xrefs: 004709BB
                                                                                              • Time stamp of existing file: (failed to read), xrefs: 00470A37
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: $-- File entry --$.tmp$@$Couldn't read time stamp. Skipping.$Dest file exists.$Dest file is protected by Windows File Protection.$Dest filename: %s$Existing file has a later time stamp. Skipping.$Existing file is a newer version. Skipping.$Existing file is protected by Windows File Protection. Skipping.$Existing file's SHA-1 hash is different from our file. Proceeding.$Existing file's SHA-1 hash matches our file. Skipping.$Failed to read existing file's SHA-1 hash. Proceeding.$Failed to strip read-only attribute.$InUn$Incrementing shared file count (32-bit).$Incrementing shared file count (64-bit).$Installing into GAC$Installing the file.$Non-default bitness: 32-bit$Non-default bitness: 64-bit$Same time stamp. Skipping.$Same version. Skipping.$Skipping due to "onlyifdestfileexists" flag.$Skipping due to "onlyifdoesntexist" flag.$Stripped read-only attribute.$Time stamp of existing file: %s$Time stamp of existing file: (failed to read)$Time stamp of our file: %s$Time stamp of our file: (failed to read)$Uninstaller requires administrator: %s$User opted not to overwrite the existing file. Skipping.$User opted not to strip the existing file's read-only attribute. Skipping.$Version of existing file: %u.%u.%u.%u$Version of existing file: (none)$Version of our file: %u.%u.%u.%u$Version of our file: (none)$Will register the file (a DLL/OCX) later.$Will register the file (a type library) later.
                                                                                              • API String ID: 0-4021121268
                                                                                              • Opcode ID: cebd1a573a13cfb1480ab73f2a07467b13e4d984594641078933206a2f2f5451
                                                                                              • Instruction ID: 04e5041402f80353ef90c659d92e8d378e84d4fed116f8838aecbbc27e5febe3
                                                                                              • Opcode Fuzzy Hash: cebd1a573a13cfb1480ab73f2a07467b13e4d984594641078933206a2f2f5451
                                                                                              • Instruction Fuzzy Hash: 31927574A0424CDFDB21DFA9C445BDDBBB5AF05304F1480ABE848A7392D7789E49CB19

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1381 42e09c-42e0ad 1382 42e0b8-42e0dd AllocateAndInitializeSid 1381->1382 1383 42e0af-42e0b3 1381->1383 1384 42e0e3-42e100 GetVersion 1382->1384 1385 42e287-42e28f 1382->1385 1383->1385 1386 42e102-42e117 GetModuleHandleA GetProcAddress 1384->1386 1387 42e119-42e11b 1384->1387 1386->1387 1388 42e142-42e15c GetCurrentThread OpenThreadToken 1387->1388 1389 42e11d-42e12b CheckTokenMembership 1387->1389 1392 42e193-42e1bb GetTokenInformation 1388->1392 1393 42e15e-42e168 GetLastError 1388->1393 1390 42e131-42e13d 1389->1390 1391 42e269-42e27f FreeSid 1389->1391 1390->1391 1396 42e1d6-42e1fa call 402648 GetTokenInformation 1392->1396 1397 42e1bd-42e1c5 GetLastError 1392->1397 1394 42e174-42e187 GetCurrentProcess OpenProcessToken 1393->1394 1395 42e16a-42e16f call 4031bc 1393->1395 1394->1392 1401 42e189-42e18e call 4031bc 1394->1401 1395->1385 1407 42e208-42e210 1396->1407 1408 42e1fc-42e206 call 4031bc * 2 1396->1408 1397->1396 1398 42e1c7-42e1d1 call 4031bc * 2 1397->1398 1398->1385 1401->1385 1412 42e212-42e213 1407->1412 1413 42e243-42e261 call 402660 CloseHandle 1407->1413 1408->1385 1417 42e215-42e228 EqualSid 1412->1417 1418 42e22a-42e237 1417->1418 1419 42e23f-42e241 1417->1419 1418->1419 1422 42e239-42e23d 1418->1422 1419->1413 1419->1417 1422->1413
                                                                                              APIs
                                                                                              • AllocateAndInitializeSid.ADVAPI32(00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0D6
                                                                                              • GetVersion.KERNEL32(00000000,0042E280,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0F3
                                                                                              • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E280,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E10C
                                                                                              • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042E112
                                                                                              • CheckTokenMembership.KERNELBASE(00000000,00000000,?,00000000,0042E280,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E127
                                                                                              • FreeSid.ADVAPI32(00000000,0042E287,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E27A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressAllocateCheckFreeHandleInitializeMembershipModuleProcTokenVersion
                                                                                              • String ID: CheckTokenMembership$advapi32.dll
                                                                                              • API String ID: 2252812187-1888249752
                                                                                              • Opcode ID: a9f409996ddfe82e0213da269ff1de212d34eb3ec341ac20085b7d7d2472ef68
                                                                                              • Instruction ID: e5677345bf142a8b1d9111380f95962c8bb8cf61ba8e960ca5c3fd0f127139eb
                                                                                              • Opcode Fuzzy Hash: a9f409996ddfe82e0213da269ff1de212d34eb3ec341ac20085b7d7d2472ef68
                                                                                              • Instruction Fuzzy Hash: E351A271B44215EEEB10EAE69C42BBF77ACEB09704F9404BBB901F7281D57C99018B79

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1445 4502c0-4502cd 1446 4502d3-4502e0 GetVersion 1445->1446 1447 45037c-450386 1445->1447 1446->1447 1448 4502e6-4502fc LoadLibraryA 1446->1448 1448->1447 1449 4502fe-450377 GetProcAddress * 6 1448->1449 1449->1447
                                                                                              APIs
                                                                                              • GetVersion.KERNEL32(00480B52), ref: 004502D3
                                                                                              • LoadLibraryA.KERNEL32(Rstrtmgr.dll,00480B52), ref: 004502EB
                                                                                              • GetProcAddress.KERNEL32(6ECE0000,RmStartSession), ref: 00450309
                                                                                              • GetProcAddress.KERNEL32(6ECE0000,RmRegisterResources), ref: 0045031E
                                                                                              • GetProcAddress.KERNEL32(6ECE0000,RmGetList), ref: 00450333
                                                                                              • GetProcAddress.KERNEL32(6ECE0000,RmShutdown), ref: 00450348
                                                                                              • GetProcAddress.KERNEL32(6ECE0000,RmRestart), ref: 0045035D
                                                                                              • GetProcAddress.KERNEL32(6ECE0000,RmEndSession), ref: 00450372
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$LibraryLoadVersion
                                                                                              • String ID: RmEndSession$RmGetList$RmRegisterResources$RmRestart$RmShutdown$RmStartSession$Rstrtmgr.dll
                                                                                              • API String ID: 1968650500-3419246398
                                                                                              • Opcode ID: 2681632e5309952c30eea3f8c2bf2722b4339596373eceda0d07b93e3cd0d7e4
                                                                                              • Instruction ID: c77cef2ad5653e61b65a4477cbb73d0d56cf7b8a9d174f96be3e9b6947252677
                                                                                              • Opcode Fuzzy Hash: 2681632e5309952c30eea3f8c2bf2722b4339596373eceda0d07b93e3cd0d7e4
                                                                                              • Instruction Fuzzy Hash: B211F7B4510301DBD710FB61BF45A2E36E9E728315B08063FE804961A2CB7C4844CF8C

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1593 423c0c-423c40 1594 423c42-423c43 1593->1594 1595 423c74-423c8b call 423b68 1593->1595 1596 423c45-423c61 call 40b24c 1594->1596 1601 423cec-423cf1 1595->1601 1602 423c8d 1595->1602 1624 423c63-423c6b 1596->1624 1625 423c70-423c72 1596->1625 1603 423cf3 1601->1603 1604 423d27-423d2c 1601->1604 1605 423c93-423c96 1602->1605 1606 423d50-423d60 1602->1606 1612 423fb1-423fb9 1603->1612 1613 423cf9-423d01 1603->1613 1607 423d32-423d35 1604->1607 1608 42409a-4240a8 IsIconic 1604->1608 1614 423cc5-423cc8 1605->1614 1615 423c98 1605->1615 1610 423d62-423d67 1606->1610 1611 423d6b-423d73 call 424194 1606->1611 1618 4240d6-4240eb call 424850 1607->1618 1619 423d3b-423d3c 1607->1619 1620 424152-42415a 1608->1620 1629 4240ae-4240b9 GetFocus 1608->1629 1626 423d78-423d80 call 4241dc 1610->1626 1627 423d69-423d8c call 423b84 1610->1627 1611->1620 1612->1620 1621 423fbf-423fca call 4181e0 1612->1621 1630 423f13-423f3a SendMessageA 1613->1630 1631 423d07-423d0c 1613->1631 1622 423da9-423db0 1614->1622 1623 423cce-423ccf 1614->1623 1616 423df6-423e06 call 423b84 1615->1616 1617 423c9e-423ca1 1615->1617 1616->1620 1640 423ca7-423caa 1617->1640 1641 423e1e-423e3a PostMessageA call 423b84 1617->1641 1618->1620 1634 423d42-423d45 1619->1634 1635 4240ed-4240f4 1619->1635 1633 424171-424177 1620->1633 1621->1620 1683 423fd0-423fdf call 4181e0 IsWindowEnabled 1621->1683 1622->1620 1644 423db6-423dbd 1622->1644 1645 423cd5-423cd8 1623->1645 1646 423f3f-423f46 1623->1646 1624->1633 1625->1595 1625->1596 1626->1620 1627->1620 1629->1620 1639 4240bf-4240c8 call 41eff4 1629->1639 1630->1620 1647 423d12-423d13 1631->1647 1648 42404a-424055 1631->1648 1650 424120-424127 1634->1650 1651 423d4b 1634->1651 1661 4240f6-424109 call 4244d4 1635->1661 1662 42410b-42411e call 42452c 1635->1662 1639->1620 1695 4240ce-4240d4 SetFocus 1639->1695 1658 423cb0-423cb3 1640->1658 1659 423ea5-423eac 1640->1659 1641->1620 1644->1620 1664 423dc3-423dc9 1644->1664 1665 423cde-423ce1 1645->1665 1666 423e3f-423e5f call 423b84 1645->1666 1646->1620 1654 423f4c-423f51 call 404e54 1646->1654 1667 424072-42407d 1647->1667 1668 423d19-423d1c 1647->1668 1648->1620 1652 42405b-42406d 1648->1652 1687 42413a-424149 1650->1687 1688 424129-424138 1650->1688 1671 42414b-42414c call 423b84 1651->1671 1652->1620 1654->1620 1678 423cb9-423cba 1658->1678 1679 423dce-423ddc IsIconic 1658->1679 1680 423eae-423ec1 call 423b14 1659->1680 1681 423edf-423ef0 call 423b84 1659->1681 1661->1620 1662->1620 1664->1620 1684 423ce7 1665->1684 1685 423e0b-423e19 call 424178 1665->1685 1712 423e83-423ea0 call 423a84 PostMessageA 1666->1712 1713 423e61-423e7e call 423b14 PostMessageA 1666->1713 1667->1620 1672 424083-424095 1667->1672 1669 423d22 1668->1669 1670 423f56-423f5e 1668->1670 1669->1671 1670->1620 1693 423f64-423f6b 1670->1693 1708 424151 1671->1708 1672->1620 1696 423cc0 1678->1696 1697 423d91-423d99 1678->1697 1703 423dea-423df1 call 423b84 1679->1703 1704 423dde-423de5 call 423bc0 1679->1704 1725 423ed3-423eda call 423b84 1680->1725 1726 423ec3-423ecd call 41ef58 1680->1726 1719 423ef2-423ef8 call 41eea4 1681->1719 1720 423f06-423f0e call 423a84 1681->1720 1683->1620 1727 423fe5-423ff4 call 4181e0 IsWindowVisible 1683->1727 1684->1671 1685->1620 1687->1620 1688->1620 1693->1620 1711 423f71-423f80 call 4181e0 IsWindowEnabled 1693->1711 1695->1620 1696->1671 1697->1620 1714 423d9f-423da4 call 422c4c 1697->1714 1703->1620 1704->1620 1708->1620 1711->1620 1740 423f86-423f9c call 412310 1711->1740 1712->1620 1713->1620 1714->1620 1738 423efd-423f00 1719->1738 1720->1620 1725->1620 1726->1725 1727->1620 1745 423ffa-424045 GetFocus call 4181e0 SetFocus call 415240 SetFocus 1727->1745 1738->1720 1740->1620 1749 423fa2-423fac 1740->1749 1745->1620 1749->1620
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 22958418fcb5307417e2cb8c5b21c835fdc4d5c2778e3f26f52eb9817f6a2da5
                                                                                              • Instruction ID: afb4f91cf4018cf9acc1c9974f14325182323c15c0e0405bd0f9b005e596376e
                                                                                              • Opcode Fuzzy Hash: 22958418fcb5307417e2cb8c5b21c835fdc4d5c2778e3f26f52eb9817f6a2da5
                                                                                              • Instruction Fuzzy Hash: 03E1AE31700124EFDB04DF69E989AADB7B5FB54300FA440AAE5559B352C73CEE81DB09

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1936 4673a4-4673ba 1937 4673c4-46747b call 49577c call 402b30 * 6 1936->1937 1938 4673bc-4673bf call 402d30 1936->1938 1955 46747d-4674a4 call 41463c 1937->1955 1956 4674b8-4674d1 1937->1956 1938->1937 1960 4674a6 1955->1960 1961 4674a9-4674b3 call 4145fc 1955->1961 1962 4674d3-4674fa call 41461c 1956->1962 1963 46750e-46751c call 495a84 1956->1963 1960->1961 1961->1956 1971 4674ff-467509 call 4145dc 1962->1971 1972 4674fc 1962->1972 1969 46751e-46752d call 4958cc 1963->1969 1970 46752f-467531 call 4959f0 1963->1970 1977 467536-467589 call 4953e0 call 41a3d0 * 2 1969->1977 1970->1977 1971->1963 1972->1971 1984 46759a-4675af call 451458 call 414b18 1977->1984 1985 46758b-467598 call 414b18 1977->1985 1990 4675b4-4675bb 1984->1990 1985->1990 1992 467603-467a89 call 49581c call 495b40 call 41461c * 3 call 4146bc call 4145dc * 3 call 460bfc call 460c14 call 460c20 call 460c68 call 460bfc call 460c14 call 460c20 call 460c68 call 460c14 call 460c68 LoadBitmapA call 41d6b0 call 460c38 call 460c50 call 467180 call 468c94 call 466800 call 40357c call 414b18 call 466b38 call 466b40 call 466800 call 40357c * 2 call 414b18 call 468c94 call 466800 call 414b18 call 466b38 call 466b40 call 414b18 * 2 call 468c94 call 414b18 * 2 call 466b38 call 4145fc call 466b38 call 4145fc call 468c94 call 414b18 call 466b38 call 466b40 call 468c94 call 414b18 call 466b38 call 4145fc * 2 call 414b18 call 466b38 call 4145fc 1990->1992 1993 4675bd-4675fe call 4146bc call 414700 call 420f98 call 420fc4 call 420b68 call 420b94 1990->1993 2123 467ae5-467afe call 414a44 * 2 1992->2123 2124 467a8b-467ae3 call 4145fc call 414b18 call 466b38 call 4145fc 1992->2124 1993->1992 2131 467b03-467bb4 call 466800 call 468c94 call 466800 call 414b18 call 495b40 call 466b38 2123->2131 2124->2131 2150 467bb6-467bd1 2131->2150 2151 467bee-467e24 call 466800 call 414b18 call 495b50 * 2 call 42e8c0 call 4145fc call 466b38 call 4145fc call 4181e0 call 42ed38 call 414b18 call 49581c call 495b40 call 41461c call 466800 call 414b18 call 466b38 call 4145fc call 466800 call 468c94 call 466800 call 414b18 call 466b38 call 4145fc call 466b40 call 466800 call 414b18 call 466b38 2131->2151 2152 467bd6-467be9 call 4145fc 2150->2152 2153 467bd3 2150->2153 2212 467e26-467e2f 2151->2212 2213 467e65-467f1e call 466800 call 468c94 call 466800 call 414b18 call 495b40 call 466b38 2151->2213 2152->2151 2153->2152 2212->2213 2214 467e31-467e60 call 414a44 call 466b40 2212->2214 2231 467f20-467f3b 2213->2231 2232 467f58-468379 call 466800 call 414b18 call 495b50 * 2 call 42e8c0 call 4145fc call 466b38 call 4145fc call 414b18 call 49581c call 495b40 call 41461c call 414b18 call 466800 call 468c94 call 466800 call 414b18 call 466b38 call 466b40 call 42bbd0 call 495b50 call 44e8b0 call 466800 call 468c94 call 466800 call 468c94 call 466800 call 468c94 * 2 call 414b18 call 466b38 call 466b40 call 468c94 call 4953e0 call 41a3d0 call 466800 call 40357c call 414b18 call 466b38 call 4145fc call 414b18 * 2 call 495b50 call 403494 call 40357c * 2 call 414b18 2213->2232 2214->2213 2233 467f40-467f53 call 4145fc 2231->2233 2234 467f3d 2231->2234 2331 46839d-4683a4 2232->2331 2332 46837b-468398 call 44ffdc call 450138 2232->2332 2233->2232 2234->2233 2333 4683a6-4683c3 call 44ffdc call 450138 2331->2333 2334 4683c8-4683cf 2331->2334 2332->2331 2333->2334 2338 4683f3-468439 call 4181e0 GetSystemMenu AppendMenuA call 403738 AppendMenuA call 468d88 2334->2338 2339 4683d1-4683ee call 44ffdc call 450138 2334->2339 2352 468453 2338->2352 2353 46843b-468442 2338->2353 2339->2338 2356 468455-468464 2352->2356 2354 468444-46844d 2353->2354 2355 46844f-468451 2353->2355 2354->2352 2354->2355 2355->2356 2357 468466-46846d 2356->2357 2358 46847e 2356->2358 2359 46846f-468478 2357->2359 2360 46847a-46847c 2357->2360 2361 468480-46849a 2358->2361 2359->2358 2359->2360 2360->2361 2362 468543-46854a 2361->2362 2363 4684a0-4684a9 2361->2363 2364 468550-468573 call 47c26c call 403450 2362->2364 2365 4685dd-4685eb call 414b18 2362->2365 2366 468504-46853e call 414b18 * 3 2363->2366 2367 4684ab-468502 call 47c26c call 414b18 call 47c26c call 414b18 call 47c26c call 414b18 2363->2367 2389 468584-468598 call 403494 2364->2389 2390 468575-468582 call 47c440 2364->2390 2374 4685f0-4685f9 2365->2374 2366->2362 2367->2362 2378 4685ff-468617 call 429fd8 2374->2378 2379 468709-468738 call 42b96c call 44e83c 2374->2379 2396 46868e-468692 2378->2396 2397 468619-46861d 2378->2397 2406 4687e6-4687ea 2379->2406 2407 46873e-468742 2379->2407 2411 4685aa-4685db call 42c804 call 42cbc0 call 403494 call 414b18 2389->2411 2412 46859a-4685a5 call 403494 2389->2412 2390->2411 2402 468694-46869d 2396->2402 2403 4686e2-4686e6 2396->2403 2404 46861f-468659 call 40b24c call 47c26c 2397->2404 2402->2403 2413 46869f-4686aa 2402->2413 2409 4686fa-468704 call 42a05c 2403->2409 2410 4686e8-4686f8 call 42a05c 2403->2410 2464 46865b-468662 2404->2464 2465 468688-46868c 2404->2465 2418 4687ec-4687f3 2406->2418 2419 468869-46886d 2406->2419 2417 468744-468756 call 40b24c 2407->2417 2409->2379 2410->2379 2411->2374 2412->2411 2413->2403 2415 4686ac-4686b0 2413->2415 2425 4686b2-4686d5 call 40b24c call 406ac4 2415->2425 2444 468788-4687bf call 47c26c call 44cb0c 2417->2444 2445 468758-468786 call 47c26c call 44cbdc 2417->2445 2418->2419 2428 4687f5-4687fc 2418->2428 2429 4688d6-4688df 2419->2429 2430 46886f-468886 call 40b24c 2419->2430 2474 4686d7-4686da 2425->2474 2475 4686dc-4686e0 2425->2475 2428->2419 2439 4687fe-468809 2428->2439 2437 4688e1-4688f9 call 40b24c call 4699fc 2429->2437 2438 4688fe-468913 call 466ee0 call 466c5c 2429->2438 2457 4688c6-4688d4 call 4699fc 2430->2457 2458 468888-4688c4 call 40b24c call 4699fc * 2 call 46989c 2430->2458 2437->2438 2489 468965-46896f call 414a44 2438->2489 2490 468915-468938 call 42a040 call 40b24c 2438->2490 2439->2438 2447 46880f-468813 2439->2447 2482 4687c4-4687c8 2444->2482 2445->2482 2456 468815-46882b call 40b24c 2447->2456 2486 46885e-468862 2456->2486 2487 46882d-468859 call 42a05c call 4699fc call 46989c 2456->2487 2457->2438 2458->2438 2464->2465 2476 468664-468676 call 406ac4 2464->2476 2465->2396 2465->2404 2474->2403 2475->2403 2475->2425 2476->2465 2501 468678-468682 2476->2501 2492 4687d3-4687d5 2482->2492 2493 4687ca-4687d1 2482->2493 2486->2456 2494 468864 2486->2494 2487->2438 2502 468974-468993 call 414a44 2489->2502 2518 468943-468952 call 414a44 2490->2518 2519 46893a-468941 2490->2519 2500 4687dc-4687e0 2492->2500 2493->2492 2493->2500 2494->2438 2500->2406 2500->2417 2501->2465 2506 468684 2501->2506 2514 468995-4689b8 call 42a040 call 469b5c 2502->2514 2515 4689bd-4689e0 call 47c26c call 403450 2502->2515 2506->2465 2514->2515 2533 4689e2-4689eb 2515->2533 2534 4689fc-468a05 2515->2534 2518->2502 2519->2518 2523 468954-468963 call 414a44 2519->2523 2523->2502 2533->2534 2535 4689ed-4689fa call 47c440 2533->2535 2536 468a07-468a19 call 403684 2534->2536 2537 468a1b-468a2b call 403494 2534->2537 2545 468a3d-468a54 call 414b18 2535->2545 2536->2537 2544 468a2d-468a38 call 403494 2536->2544 2537->2545 2544->2545 2549 468a56-468a5d 2545->2549 2550 468a8a-468a94 call 414a44 2545->2550 2552 468a5f-468a68 2549->2552 2553 468a6a-468a74 call 42b0e4 2549->2553 2554 468a99-468abe call 403400 * 3 2550->2554 2552->2553 2555 468a79-468a88 call 414a44 2552->2555 2553->2555 2555->2554
                                                                                              APIs
                                                                                                • Part of subcall function 004958CC: GetWindowRect.USER32(00000000), ref: 004958E2
                                                                                              • LoadBitmapA.USER32(00400000,STOPIMAGE), ref: 00467773
                                                                                                • Part of subcall function 0041D6B0: GetObjectA.GDI32(?,00000018,0046778D), ref: 0041D6DB
                                                                                                • Part of subcall function 00467180: SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 00467223
                                                                                                • Part of subcall function 00467180: ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467249
                                                                                                • Part of subcall function 00467180: ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 004672A0
                                                                                                • Part of subcall function 00466B40: KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467828,00000000,00000000,00000000,0000000C,00000000), ref: 00466B58
                                                                                                • Part of subcall function 00495B50: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 00495B5A
                                                                                                • Part of subcall function 0042ED38: GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDA8
                                                                                                • Part of subcall function 0042ED38: SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDC5
                                                                                                • Part of subcall function 0049581C: GetDC.USER32(00000000), ref: 0049583E
                                                                                                • Part of subcall function 0049581C: SelectObject.GDI32(?,00000000), ref: 00495864
                                                                                                • Part of subcall function 0049581C: ReleaseDC.USER32(00000000,?), ref: 004958B5
                                                                                                • Part of subcall function 00495B40: MulDiv.KERNEL32(0000004B,?,00000006), ref: 00495B4A
                                                                                              • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,0220FC00,02211960,?,?,02211990,?,?,022119E0,?), ref: 004683FD
                                                                                              • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 0046840E
                                                                                              • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00468426
                                                                                                • Part of subcall function 0042A05C: SendMessageA.USER32(00000000,0000014E,00000000,00000000), ref: 0042A072
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$AppendExtractIconObject$AddressAutoBitmapCallbackCompleteDispatcherFileInfoLoadMessageProcRectReleaseSelectSendSystemUserWindow
                                                                                              • String ID: $(Default)$STOPIMAGE$%H
                                                                                              • API String ID: 3231140908-2624782221
                                                                                              • Opcode ID: cd61aa661d0cbe35304877807cea77ca0702e96d718fc27b010991c92e86a780
                                                                                              • Instruction ID: 1a3196d4b4984e68f3522cc8585b165e0004af585c118fa25862355e2bbb38c0
                                                                                              • Opcode Fuzzy Hash: cd61aa661d0cbe35304877807cea77ca0702e96d718fc27b010991c92e86a780
                                                                                              • Instruction Fuzzy Hash: 95F2C6346005248FCB00EF69D9D9F9973F1BF49304F1582BAE5049B36ADB74AC46CB9A
                                                                                              APIs
                                                                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,004750F2,?,?,0049C1E0,00000000), ref: 00474FE1
                                                                                              • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,004750F2,?,?,0049C1E0,00000000), ref: 004750BE
                                                                                              • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,004750F2,?,?,0049C1E0,00000000), ref: 004750CC
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Find$File$CloseFirstNext
                                                                                              • String ID: unins$unins???.*
                                                                                              • API String ID: 3541575487-1009660736
                                                                                              • Opcode ID: 490a2bf6f62b777b12f8bb075fd261ec892e44da2a65e6c72c5e66397d3a6b60
                                                                                              • Instruction ID: 191fa049ef1442540897bd6b232d6b1da598bf4afdbbee48782243349675ce5a
                                                                                              • Opcode Fuzzy Hash: 490a2bf6f62b777b12f8bb075fd261ec892e44da2a65e6c72c5e66397d3a6b60
                                                                                              • Instruction Fuzzy Hash: 95315074A00548ABCB10EB65CD81BDEB7A9DF45304F50C0B6E40CAB3A2DB789F418B59
                                                                                              APIs
                                                                                              • GetVersion.KERNEL32(?,0046E17A), ref: 0046E0EE
                                                                                              • CoCreateInstance.OLE32(00499B98,00000000,00000001,00499BA8,?,?,0046E17A), ref: 0046E10A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateInstanceVersion
                                                                                              • String ID: (qn
                                                                                              • API String ID: 1462612201-1429326498
                                                                                              • Opcode ID: 323ef6e325584454da74969db5385277b15969f7569c16a340aaa36caeb4eadb
                                                                                              • Instruction ID: e32462cabb755f907f5de1887460af807d545ab7c9798ff14e002636b2035e3f
                                                                                              • Opcode Fuzzy Hash: 323ef6e325584454da74969db5385277b15969f7569c16a340aaa36caeb4eadb
                                                                                              • Instruction Fuzzy Hash: 90F0A7352812009FEB10975ADC86B8937C47B22315F50007BE04497292D2BD94C0471F
                                                                                              APIs
                                                                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,00452AC3,?,?,-00000001,00000000), ref: 00452A9D
                                                                                              • GetLastError.KERNEL32(00000000,?,00000000,00452AC3,?,?,-00000001,00000000), ref: 00452AA5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorFileFindFirstLast
                                                                                              • String ID:
                                                                                              • API String ID: 873889042-0
                                                                                              • Opcode ID: 9c675a8f1f28b386d0fa8c71b8ecb41695e84785a8bb79b0d9bc0322d07a8b6a
                                                                                              • Instruction ID: 3e58272229af866f17ac5928e9872a720c3be2d4903e778e839a846eb7d55d53
                                                                                              • Opcode Fuzzy Hash: 9c675a8f1f28b386d0fa8c71b8ecb41695e84785a8bb79b0d9bc0322d07a8b6a
                                                                                              • Instruction Fuzzy Hash: 94F0F971A04604AB8B10EF669D4149EF7ACEB8672571046BBFC14E3282DAB84E0485A8
                                                                                              APIs
                                                                                              • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,00408633,?,00000000,00408712), ref: 00408586
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: InfoLocale
                                                                                              • String ID:
                                                                                              • API String ID: 2299586839-0
                                                                                              • Opcode ID: 64da881718ef9bfb5c3691e8182369eeaf442f2681d4624e7b5adc518b999176
                                                                                              • Instruction ID: 8daab3ef8e56b0da8b8c23f45c5b5388ad46b50bd825570c2d348c61856efc62
                                                                                              • Opcode Fuzzy Hash: 64da881718ef9bfb5c3691e8182369eeaf442f2681d4624e7b5adc518b999176
                                                                                              • Instruction Fuzzy Hash: BFE0223170021466C311AA2A9C86AEAB34C9758310F00427FB904E73C2EDB89E4042A8
                                                                                              APIs
                                                                                              • NtdllDefWindowProc_A.USER32(?,?,?,?,?,00424151,?,00000000,0042415C), ref: 00423BAE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: NtdllProc_Window
                                                                                              • String ID:
                                                                                              • API String ID: 4255912815-0
                                                                                              • Opcode ID: 03c86555d74cd6010afd77b9e61a524e96c156e733cd5bd8e2feacc4387cef90
                                                                                              • Instruction ID: a748582893d7571d6ac8bdbe819d0a8fbf5f36db2d3505b6f19a51c7a0bbae16
                                                                                              • Opcode Fuzzy Hash: 03c86555d74cd6010afd77b9e61a524e96c156e733cd5bd8e2feacc4387cef90
                                                                                              • Instruction Fuzzy Hash: 47F0B979205608AF8B40DF99C588D4ABBE8AB4C260B058195B988CB321C234ED808F90
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: NameUser
                                                                                              • String ID:
                                                                                              • API String ID: 2645101109-0
                                                                                              • Opcode ID: 969018677e36c7ee3cac7a31a88a81c68082f6a067fe28717e4d5eb0c099a74a
                                                                                              • Instruction ID: 9f318ec9847dd9a6abcb639c8bc611599857aea0b867fcad4bfaeec6bdb042bf
                                                                                              • Opcode Fuzzy Hash: 969018677e36c7ee3cac7a31a88a81c68082f6a067fe28717e4d5eb0c099a74a
                                                                                              • Instruction Fuzzy Hash: 8FD0C27230470473CB00AA689C825AA35CD8B84305F00483E3CC5DA2C3FABDDA485756
                                                                                              APIs
                                                                                              • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042F53C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: NtdllProc_Window
                                                                                              • String ID:
                                                                                              • API String ID: 4255912815-0
                                                                                              • Opcode ID: 9e43cbcd657a147b44e82c26281af1c584f356d37a2e763e4ec43db1fd6d4cd6
                                                                                              • Instruction ID: 7ca9c19e24a5def9c493c34941f9da96f9ca037215ec7a65a90973bf7a04e639
                                                                                              • Opcode Fuzzy Hash: 9e43cbcd657a147b44e82c26281af1c584f356d37a2e763e4ec43db1fd6d4cd6
                                                                                              • Instruction Fuzzy Hash: FCD09E7120011D7B9B00DE99E840D6B33AD9B88710B909925F945D7642D634ED9197A5

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 844 46f058-46f08a 845 46f0a7 844->845 846 46f08c-46f093 844->846 849 46f0ae-46f0e6 call 403634 call 403738 call 42dec0 845->849 847 46f095-46f09c 846->847 848 46f09e-46f0a5 846->848 847->845 847->848 848->849 856 46f101-46f12a call 403738 call 42dde4 849->856 857 46f0e8-46f0fc call 403738 call 42dec0 849->857 865 46f12c-46f135 call 46ed28 856->865 866 46f13a-46f163 call 46ee44 856->866 857->856 865->866 870 46f175-46f178 call 403400 866->870 871 46f165-46f173 call 403494 866->871 875 46f17d-46f1c8 call 46ee44 call 42c3fc call 46ee8c call 46ee44 870->875 871->875 884 46f1de-46f1ff call 45559c call 46ee44 875->884 885 46f1ca-46f1dd call 46eeb4 875->885 892 46f255-46f25c 884->892 893 46f201-46f254 call 46ee44 call 431404 call 46ee44 call 431404 call 46ee44 884->893 885->884 894 46f25e-46f29b call 431404 call 46ee44 call 431404 call 46ee44 892->894 895 46f29c-46f2a3 892->895 893->892 894->895 897 46f2e4-46f309 call 40b24c call 46ee44 895->897 898 46f2a5-46f2e3 call 46ee44 * 3 895->898 919 46f30b-46f316 call 47c26c 897->919 920 46f318-46f321 call 403494 897->920 898->897 927 46f326-46f331 call 478e04 919->927 920->927 934 46f333-46f338 927->934 935 46f33a 927->935 936 46f33f-46f509 call 403778 call 46ee44 call 47c26c call 46ee8c call 403494 call 40357c * 2 call 46ee44 call 403494 call 40357c * 2 call 46ee44 call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c 934->936 935->936 999 46f51f-46f52d call 46eeb4 936->999 1000 46f50b-46f51d call 46ee44 936->1000 1004 46f532 999->1004 1005 46f533-46f57c call 46eeb4 call 46eee8 call 46ee44 call 47c26c call 46ef4c 1000->1005 1004->1005 1016 46f5a2-46f5af 1005->1016 1017 46f57e-46f5a1 call 46eeb4 * 2 1005->1017 1019 46f5b5-46f5bc 1016->1019 1020 46f67e-46f685 1016->1020 1017->1016 1024 46f5be-46f5c5 1019->1024 1025 46f629-46f638 1019->1025 1021 46f687-46f6bd call 494cec 1020->1021 1022 46f6df-46f6f5 RegCloseKey 1020->1022 1021->1022 1024->1025 1029 46f5c7-46f5eb call 430bcc 1024->1029 1028 46f63b-46f648 1025->1028 1032 46f65f-46f678 call 430c08 call 46eeb4 1028->1032 1033 46f64a-46f657 1028->1033 1029->1028 1039 46f5ed-46f5ee 1029->1039 1042 46f67d 1032->1042 1033->1032 1037 46f659-46f65d 1033->1037 1037->1020 1037->1032 1041 46f5f0-46f616 call 40b24c call 479630 1039->1041 1047 46f623-46f625 1041->1047 1048 46f618-46f61e call 430bcc 1041->1048 1042->1020 1047->1041 1050 46f627 1047->1050 1048->1047 1050->1028
                                                                                              APIs
                                                                                                • Part of subcall function 0046EE44: RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,0047620E,?,0049C1E0,?,0046F15B,?,00000000,0046F6F6,?,_is1), ref: 0046EE67
                                                                                                • Part of subcall function 0046EEB4: RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F532,?,?,00000000,0046F6F6,?,_is1,?), ref: 0046EEC7
                                                                                              • RegCloseKey.ADVAPI32(?,0046F6FD,?,_is1,?,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,0046F748,?,?,0049C1E0,00000000), ref: 0046F6F0
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Value$Close
                                                                                              • String ID: " /SILENT$5.5.3 (a)$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$EstimatedSize$HelpLink$HelpTelephone$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: Language$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallDate$InstallLocation$MajorVersion$MinorVersion$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$_is1
                                                                                              • API String ID: 3391052094-3342197833
                                                                                              • Opcode ID: 41e5a022c9dfc144d242315d0234d20c9f1df57cded100a3ade253d049a3cf6c
                                                                                              • Instruction ID: 0d1426ff9ce9a688a4d167ea33859b9e50b28094dc6fe7db73e07d6bdcf854ec
                                                                                              • Opcode Fuzzy Hash: 41e5a022c9dfc144d242315d0234d20c9f1df57cded100a3ade253d049a3cf6c
                                                                                              • Instruction Fuzzy Hash: D1125935A001089BDB04EF95E881ADE73F5EB48304F24817BE8506B366EB79AD45CF5E

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1424 483a7c-483aa1 GetModuleHandleA GetProcAddress 1425 483b08-483b0d GetSystemInfo 1424->1425 1426 483aa3-483ab9 GetNativeSystemInfo GetProcAddress 1424->1426 1427 483b12-483b1b 1425->1427 1426->1427 1428 483abb-483ac6 GetCurrentProcess 1426->1428 1429 483b2b-483b32 1427->1429 1430 483b1d-483b21 1427->1430 1428->1427 1437 483ac8-483acc 1428->1437 1433 483b4d-483b52 1429->1433 1431 483b23-483b27 1430->1431 1432 483b34-483b3b 1430->1432 1435 483b29-483b46 1431->1435 1436 483b3d-483b44 1431->1436 1432->1433 1435->1433 1436->1433 1437->1427 1438 483ace-483ad5 call 45271c 1437->1438 1438->1427 1442 483ad7-483ae4 GetProcAddress 1438->1442 1442->1427 1443 483ae6-483afd GetModuleHandleA GetProcAddress 1442->1443 1443->1427 1444 483aff-483b06 1443->1444 1444->1427
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00483A8D
                                                                                              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00483A9A
                                                                                              • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483AA8
                                                                                              • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483AB0
                                                                                              • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00483ABC
                                                                                              • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00483ADD
                                                                                              • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483AF0
                                                                                              • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483AF6
                                                                                              • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483B0D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
                                                                                              • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                                                                                              • API String ID: 2230631259-2623177817
                                                                                              • Opcode ID: 7dca9948a1095c4364ab55fa8ed369d502b26d1142efbcbd424e95be4cda74f5
                                                                                              • Instruction ID: d1db678d6bd555fecb25ccca0b477ef677e73c145b16f55f8d8b06b946339d0c
                                                                                              • Opcode Fuzzy Hash: 7dca9948a1095c4364ab55fa8ed369d502b26d1142efbcbd424e95be4cda74f5
                                                                                              • Instruction Fuzzy Hash: 7F1181C0204741A4DA00BFB94D45B6F65889B11F2AF040C7B6840AA287EABCEF44A76E

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1450 468d88-468dc0 call 47c26c 1453 468dc6-468dd6 call 478e24 1450->1453 1454 468fa2-468fbc call 403420 1450->1454 1459 468ddb-468e20 call 4078f4 call 403738 call 42de1c 1453->1459 1465 468e25-468e27 1459->1465 1466 468e2d-468e42 1465->1466 1467 468f98-468f9c 1465->1467 1468 468e57-468e5e 1466->1468 1469 468e44-468e52 call 42dd4c 1466->1469 1467->1454 1467->1459 1471 468e60-468e82 call 42dd4c call 42dd64 1468->1471 1472 468e8b-468e92 1468->1472 1469->1468 1471->1472 1493 468e84 1471->1493 1473 468e94-468eb9 call 42dd4c * 2 1472->1473 1474 468eeb-468ef2 1472->1474 1496 468ebb-468ec4 call 4314f8 1473->1496 1497 468ec9-468edb call 42dd4c 1473->1497 1478 468ef4-468f06 call 42dd4c 1474->1478 1479 468f38-468f3f 1474->1479 1489 468f16-468f28 call 42dd4c 1478->1489 1490 468f08-468f11 call 4314f8 1478->1490 1481 468f41-468f75 call 42dd4c * 3 1479->1481 1482 468f7a-468f90 RegCloseKey 1479->1482 1481->1482 1489->1479 1503 468f2a-468f33 call 4314f8 1489->1503 1490->1489 1493->1472 1496->1497 1497->1474 1507 468edd-468ee6 call 4314f8 1497->1507 1503->1479 1507->1474
                                                                                              APIs
                                                                                                • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                              • RegCloseKey.ADVAPI32(?,00468FA2,?,?,00000001,00000000,00000000,00468FBD,?,00000000,00000000,?), ref: 00468F8B
                                                                                              Strings
                                                                                              • Inno Setup: User Info: Organization, xrefs: 00468F5A
                                                                                              • Inno Setup: Setup Type, xrefs: 00468E9A
                                                                                              • Inno Setup: User Info: Serial, xrefs: 00468F6D
                                                                                              • Inno Setup: Deselected Tasks, xrefs: 00468F19
                                                                                              • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00468DE7
                                                                                              • %s\%s_is1, xrefs: 00468E05
                                                                                              • Inno Setup: App Path, xrefs: 00468E4A
                                                                                              • Inno Setup: Selected Tasks, xrefs: 00468EF7
                                                                                              • Inno Setup: No Icons, xrefs: 00468E73
                                                                                              • Inno Setup: Selected Components, xrefs: 00468EAA
                                                                                              • Inno Setup: User Info: Name, xrefs: 00468F47
                                                                                              • Inno Setup: Icon Group, xrefs: 00468E66
                                                                                              • Inno Setup: Deselected Components, xrefs: 00468ECC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseOpen
                                                                                              • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                                              • API String ID: 47109696-1093091907
                                                                                              • Opcode ID: b9928a5b5c0cf6c1dc91f6627cbb06318d05b30c5d76f15ccadbaf9fdfcb7506
                                                                                              • Instruction ID: 069c4cdb4b1287edb5c1b702bebeb6c44c7684ad2aa17a57d1fdfe9a2539746b
                                                                                              • Opcode Fuzzy Hash: b9928a5b5c0cf6c1dc91f6627cbb06318d05b30c5d76f15ccadbaf9fdfcb7506
                                                                                              • Instruction Fuzzy Hash: 6B51A330A006449BCB15DB65D881BDEB7F5EB48304F50857EE840AB391EB79AF01CB59

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                                • Part of subcall function 0042D898: GetWindowsDirectoryA.KERNEL32(?,00000104,00000000,00453DB4,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5), ref: 0042D8AB
                                                                                                • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                                                                • Part of subcall function 0042D8F0: GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453B5A,00000000,00453BFD,?,?,00000000,00000000,00000000,00000000,00000000,?,00453FED,00000000), ref: 0042D90A
                                                                                                • Part of subcall function 0042D8F0: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D910
                                                                                              • SHGetKnownFolderPath.SHELL32(00499D30,00008000,00000000,?,00000000,0047C942), ref: 0047C846
                                                                                              • CoTaskMemFree.OLE32(?,0047C88B), ref: 0047C87E
                                                                                                • Part of subcall function 0042D208: GetEnvironmentVariableA.KERNEL32(00000000,00000000,00000000,?,?,00000000,0042DA3E,00000000,0042DAD0,?,?,?,0049B628,00000000,00000000), ref: 0042D233
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Directory$AddressEnvironmentFolderFreeHandleKnownModulePathProcSystemTaskVariableWindows
                                                                                              • String ID: COMMAND.COM$Common Files$CommonFilesDir$Failed to get path of 64-bit Common Files directory$Failed to get path of 64-bit Program Files directory$ProgramFilesDir$SystemDrive$\Program Files$cmd.exe
                                                                                              • API String ID: 3771764029-544719455
                                                                                              • Opcode ID: 23963da8b4b34a95ffd58041a931adf40c150fbdd8371ea61f0364dbdea36cdf
                                                                                              • Instruction ID: 88e29a10730232d74bbdb0c5b7d00c3ea12cf2700f44d19641833b453bfd909d
                                                                                              • Opcode Fuzzy Hash: 23963da8b4b34a95ffd58041a931adf40c150fbdd8371ea61f0364dbdea36cdf
                                                                                              • Instruction Fuzzy Hash: 1461CF74A00204AFDB10EBA5D8C2A9E7B69EB44319F90C47FE404A7392DB3C9A44CF5D

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1752 423874-42387e 1753 4239a7-4239ab 1752->1753 1754 423884-4238a6 call 41f3c4 GetClassInfoA 1752->1754 1757 4238d7-4238e0 GetSystemMetrics 1754->1757 1758 4238a8-4238bf RegisterClassA 1754->1758 1759 4238e2 1757->1759 1760 4238e5-4238ef GetSystemMetrics 1757->1760 1758->1757 1761 4238c1-4238d2 call 408cbc call 40311c 1758->1761 1759->1760 1762 4238f1 1760->1762 1763 4238f4-423950 call 403738 call 4062e8 call 403400 call 42364c SetWindowLongA 1760->1763 1761->1757 1762->1763 1775 423952-423965 call 424178 SendMessageA 1763->1775 1776 42396a-423998 GetSystemMenu DeleteMenu * 2 1763->1776 1775->1776 1776->1753 1777 42399a-4239a2 DeleteMenu 1776->1777 1777->1753
                                                                                              APIs
                                                                                                • Part of subcall function 0041F3C4: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDA4,?,0042388F,00423C0C,0041EDA4), ref: 0041F3E2
                                                                                              • GetClassInfoA.USER32(00400000,0042367C), ref: 0042389F
                                                                                              • RegisterClassA.USER32(00499630), ref: 004238B7
                                                                                              • GetSystemMetrics.USER32(00000000), ref: 004238D9
                                                                                              • GetSystemMetrics.USER32(00000001), ref: 004238E8
                                                                                              • SetWindowLongA.USER32(00410460,000000FC,0042368C), ref: 00423944
                                                                                              • SendMessageA.USER32(00410460,00000080,00000001,00000000), ref: 00423965
                                                                                              • GetSystemMenu.USER32(00410460,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C,0041EDA4), ref: 00423970
                                                                                              • DeleteMenu.USER32(00000000,0000F030,00000000,00410460,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C,0041EDA4), ref: 0042397F
                                                                                              • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,00410460,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 0042398C
                                                                                              • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,00410460,00000000,00000000,00400000,00000000,00000000,00000000), ref: 004239A2
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                                                                                              • String ID: |6B
                                                                                              • API String ID: 183575631-3009739247
                                                                                              • Opcode ID: 0318a091630d13b60d0a3e6aa49d41dd0f32c1053a4a49f7651c07b17dd5309d
                                                                                              • Instruction ID: 5979ac727d64f3fe5c9a0a43452729076f54e0f9e4c251b9a4c28f9d6bed272f
                                                                                              • Opcode Fuzzy Hash: 0318a091630d13b60d0a3e6aa49d41dd0f32c1053a4a49f7651c07b17dd5309d
                                                                                              • Instruction Fuzzy Hash: E63152B17402006AEB10AF69DC82F6A37989B14709F60017BFA44EF2D7C6BDED40876D

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1891 47ce78-47cece call 42c3fc call 4035c0 call 47cb3c call 4525d8 1900 47ced0-47ced5 call 453344 1891->1900 1901 47ceda-47cee9 call 4525d8 1891->1901 1900->1901 1905 47cf03-47cf09 1901->1905 1906 47ceeb-47cef1 1901->1906 1909 47cf20-47cf48 call 42e394 * 2 1905->1909 1910 47cf0b-47cf11 1905->1910 1907 47cf13-47cf1b call 403494 1906->1907 1908 47cef3-47cef9 1906->1908 1907->1909 1908->1905 1911 47cefb-47cf01 1908->1911 1917 47cf6f-47cf89 GetProcAddress 1909->1917 1918 47cf4a-47cf6a call 4078f4 call 453344 1909->1918 1910->1907 1910->1909 1911->1905 1911->1907 1919 47cf95-47cfb2 call 403400 * 2 1917->1919 1920 47cf8b-47cf90 call 453344 1917->1920 1918->1917 1920->1919
                                                                                              APIs
                                                                                              • GetProcAddress.KERNEL32(73BE0000,SHGetFolderPathA), ref: 0047CF7A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc
                                                                                              • String ID: Failed to get address of SHGetFolderPath function$Failed to get version numbers of _shfoldr.dll$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$_isetup\_shfoldr.dll$shell32.dll$shfolder.dll
                                                                                              • API String ID: 190572456-1343262939
                                                                                              • Opcode ID: c4b8d3d93c7f37bb14fa31bc5bbe574b3393d33fbabbe9beac26f258e91ad005
                                                                                              • Instruction ID: ec9c61b31d03a4d18d2fa5da2167344019e511a33ceb5cf80618cf604467b355
                                                                                              • Opcode Fuzzy Hash: c4b8d3d93c7f37bb14fa31bc5bbe574b3393d33fbabbe9beac26f258e91ad005
                                                                                              • Instruction Fuzzy Hash: 20311D30E001499BCB10EFA5D5D1ADEB7B5EF44308F50847BE504E7281D778AE458B6D

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1929 40631c-406336 GetModuleHandleA GetProcAddress 1930 406338 1929->1930 1931 40633f-40634c GetProcAddress 1929->1931 1930->1931 1932 406355-406362 GetProcAddress 1931->1932 1933 40634e 1931->1933 1934 406364-406366 SetProcessDEPPolicy 1932->1934 1935 406368-406369 1932->1935 1933->1932 1934->1935
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,?,00498BC0), ref: 00406322
                                                                                              • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040632F
                                                                                              • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00406345
                                                                                              • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 0040635B
                                                                                              • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498BC0), ref: 00406366
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$HandleModulePolicyProcess
                                                                                              • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                                                              • API String ID: 3256987805-3653653586
                                                                                              • Opcode ID: fb4db72500fb8039bf9e982fa136c472a352d03826636d66c2b82dec8efce00d
                                                                                              • Instruction ID: 935c6a5f7b98c90e27654dc67135d8c1f882d2ad5d8c1b9d0efaf55941893a49
                                                                                              • Opcode Fuzzy Hash: fb4db72500fb8039bf9e982fa136c472a352d03826636d66c2b82dec8efce00d
                                                                                              • Instruction Fuzzy Hash: 97E02D90380702ACEA1032B20D82F3B144C9B54B69B26543B7D56B51C7D9BDDD7059BD
                                                                                              APIs
                                                                                              • SetWindowLongA.USER32(?,000000FC,?), ref: 00413664
                                                                                              • GetWindowLongA.USER32(?,000000F0), ref: 0041366F
                                                                                              • GetWindowLongA.USER32(?,000000F4), ref: 00413681
                                                                                              • SetWindowLongA.USER32(?,000000F4,?), ref: 00413694
                                                                                              • SetPropA.USER32(?,00000000,00000000), ref: 004136AB
                                                                                              • SetPropA.USER32(?,00000000,00000000), ref: 004136C2
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: LongWindow$Prop
                                                                                              • String ID: 3A$yA
                                                                                              • API String ID: 3887896539-3278460822
                                                                                              • Opcode ID: d9856cee796f57cc1685d9958f98130356579251106e4d85d69cc018d86e5275
                                                                                              • Instruction ID: bcb4e109f9bb3244d1d15a250a8b19338fc20a7c4ef9bfc7c396c8b3ff51cb63
                                                                                              • Opcode Fuzzy Hash: d9856cee796f57cc1685d9958f98130356579251106e4d85d69cc018d86e5275
                                                                                              • Instruction Fuzzy Hash: 8C22D06508E3C05FE31B9B74896A5D57FA0EE13325B1D45DFC4C28B1A3D21E8A8BC71A

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 2697 467180-46722a call 41461c call 41463c call 41461c call 41463c SHGetFileInfo 2706 46725f-46726a call 478e04 2697->2706 2707 46722c-467233 2697->2707 2712 46726c-4672b1 call 42c3fc call 40357c call 403738 ExtractIconA call 4670c0 2706->2712 2713 4672bb-4672ce call 47d33c 2706->2713 2707->2706 2708 467235-46725a ExtractIconA call 4670c0 2707->2708 2708->2706 2735 4672b6 2712->2735 2719 4672d0-4672da call 47d33c 2713->2719 2720 4672df-4672e3 2713->2720 2719->2720 2723 4672e5-467308 call 403738 SHGetFileInfo 2720->2723 2724 46733d-467371 call 403400 * 2 2720->2724 2723->2724 2733 46730a-467311 2723->2733 2733->2724 2734 467313-467338 ExtractIconA call 4670c0 2733->2734 2734->2724 2735->2724
                                                                                              APIs
                                                                                              • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 00467223
                                                                                              • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467249
                                                                                                • Part of subcall function 004670C0: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 00467158
                                                                                                • Part of subcall function 004670C0: DestroyCursor.USER32(00000000), ref: 0046716E
                                                                                              • ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 004672A0
                                                                                              • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 00467301
                                                                                              • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467327
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Icon$Extract$FileInfo$CursorDestroyDraw
                                                                                              • String ID: c:\directory$shell32.dll$%H
                                                                                              • API String ID: 3376378930-166502273
                                                                                              • Opcode ID: d7a251f7ede599729126a20c6e5bc656e487c76ea0efebb03c6af550fa195c4c
                                                                                              • Instruction ID: 732e1a1751fb8a235258c93266195bfa595ebd68417bad8a6af0601d960a2915
                                                                                              • Opcode Fuzzy Hash: d7a251f7ede599729126a20c6e5bc656e487c76ea0efebb03c6af550fa195c4c
                                                                                              • Instruction Fuzzy Hash: 8A516070604244AFD710DF65CD8AFDFB7A8EB48308F1081A6F80897351D6789E81DA59

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 2739 42f560-42f56a 2740 42f574-42f5b1 call 402b30 GetActiveWindow GetFocus call 41eea4 2739->2740 2741 42f56c-42f56f call 402d30 2739->2741 2747 42f5c3-42f5cb 2740->2747 2748 42f5b3-42f5bd RegisterClassA 2740->2748 2741->2740 2749 42f652-42f66e SetFocus call 403400 2747->2749 2750 42f5d1-42f602 CreateWindowExA 2747->2750 2748->2747 2750->2749 2751 42f604-42f648 call 42427c call 403738 CreateWindowExA 2750->2751 2751->2749 2758 42f64a-42f64d ShowWindow 2751->2758 2758->2749
                                                                                              APIs
                                                                                              • GetActiveWindow.USER32 ref: 0042F58F
                                                                                              • GetFocus.USER32 ref: 0042F597
                                                                                              • RegisterClassA.USER32(004997AC), ref: 0042F5B8
                                                                                              • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042F68C,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042F5F6
                                                                                              • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042F63C
                                                                                              • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042F64D
                                                                                              • SetFocus.USER32(00000000,00000000,0042F66F,?,?,?,00000001,00000000,?,00458352,00000000,0049B628), ref: 0042F654
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$CreateFocus$ActiveClassRegisterShow
                                                                                              • String ID: TWindowDisabler-Window
                                                                                              • API String ID: 3167913817-1824977358
                                                                                              • Opcode ID: d82bdac47665a0423d7aef7e4f95abac113c6b4ba7ee72313a02f6ddbd37ff30
                                                                                              • Instruction ID: c3989f54cd535b42bfd745bd8d6279a550c1ea008e6f4be51b2d228796931bcd
                                                                                              • Opcode Fuzzy Hash: d82bdac47665a0423d7aef7e4f95abac113c6b4ba7ee72313a02f6ddbd37ff30
                                                                                              • Instruction Fuzzy Hash: B021A170740710BAE310EF66AD43F1A76B8EB04B44F91853BF604AB2E1D7B86D0586AD
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498C06), ref: 00453210
                                                                                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453216
                                                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498C06), ref: 0045322A
                                                                                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453230
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressHandleModuleProc
                                                                                              • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                                              • API String ID: 1646373207-2130885113
                                                                                              • Opcode ID: d7661fd9f0913dad122060e2c1ded37189c483bc636f4dff06c0b7ded89dfa78
                                                                                              • Instruction ID: a781b9bdaab79611976bfea65fa4e072d6e85bd62b4b6e26dfe65079d72397a7
                                                                                              • Opcode Fuzzy Hash: d7661fd9f0913dad122060e2c1ded37189c483bc636f4dff06c0b7ded89dfa78
                                                                                              • Instruction Fuzzy Hash: EA01D470240B00FED301AF63AD12F663A58D7557ABF6044BBFC14965C2C77C4A088E6D
                                                                                              APIs
                                                                                              • RegisterClipboardFormatA.USER32(commdlg_help), ref: 00430948
                                                                                              • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 00430957
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 00430971
                                                                                              • GlobalAddAtomA.KERNEL32(00000000), ref: 00430992
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                                                                                              • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                                                                                              • API String ID: 4130936913-2943970505
                                                                                              • Opcode ID: 8a088dfdc0b2c62b7d21c5c596ec815df7ae76573c78c741c8a86d6eee6cb681
                                                                                              • Instruction ID: 0bd92e6c8c1c5a5b8444157758b44b4e11dae02c37acc47d2edddbd1fb793b69
                                                                                              • Opcode Fuzzy Hash: 8a088dfdc0b2c62b7d21c5c596ec815df7ae76573c78c741c8a86d6eee6cb681
                                                                                              • Instruction Fuzzy Hash: 22F012B0458340DEE300EB65994271E7BD0EF58718F50467FF498A6392D7795904CB5F
                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,0045522C,0045522C,?,0045522C,00000000), ref: 004551BA
                                                                                              • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,0045522C,0045522C,?,0045522C), ref: 004551C7
                                                                                                • Part of subcall function 00454F7C: WaitForInputIdle.USER32(?,00000032), ref: 00454FA8
                                                                                                • Part of subcall function 00454F7C: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00454FCA
                                                                                                • Part of subcall function 00454F7C: GetExitCodeProcess.KERNEL32(?,?), ref: 00454FD9
                                                                                                • Part of subcall function 00454F7C: CloseHandle.KERNEL32(?,00455006,00454FFF,?,?,?,00000000,?,?,004551DB,?,?,?,00000044,00000000,00000000), ref: 00454FF9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
                                                                                              • String ID: .bat$.cmd$COMMAND.COM" /C $D$cmd.exe" /C "
                                                                                              • API String ID: 854858120-615399546
                                                                                              • Opcode ID: 5ea26466aa0b1bd12af3311b8e232ebea4e464fdb3bb6eef9ccee3db0f285c88
                                                                                              • Instruction ID: 058baa7e90e176347c833b132b7c272bf8058e823d6e061bdbf2f6311869cd9e
                                                                                              • Opcode Fuzzy Hash: 5ea26466aa0b1bd12af3311b8e232ebea4e464fdb3bb6eef9ccee3db0f285c88
                                                                                              • Instruction Fuzzy Hash: 41516D34B0074DABCF10EFA5D852BDEBBB9AF44305F50447BB804B7292D7789A098B59
                                                                                              APIs
                                                                                              • LoadIconA.USER32(00400000,MAINICON), ref: 0042371C
                                                                                              • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 00423749
                                                                                              • OemToCharA.USER32(?,?), ref: 0042375C
                                                                                              • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 0042379C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Char$FileIconLoadLowerModuleName
                                                                                              • String ID: 2$MAINICON
                                                                                              • API String ID: 3935243913-3181700818
                                                                                              • Opcode ID: a0d1a492a3e1df344d79b5ede7937f80cf878dadafa44837ceada302c6d607ca
                                                                                              • Instruction ID: 339a64ebbf2375270c19ef2cfa2d714624ee8dcb7e06b01b5ae6522dc3b50067
                                                                                              • Opcode Fuzzy Hash: a0d1a492a3e1df344d79b5ede7937f80cf878dadafa44837ceada302c6d607ca
                                                                                              • Instruction Fuzzy Hash: 243181B0A042549ADF10EF29D8C57C67BA8AF14308F4441BAE844DB393D7BED988CB59
                                                                                              APIs
                                                                                              • GetCurrentProcessId.KERNEL32(00000000), ref: 00418F3D
                                                                                              • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F5E
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 00418F79
                                                                                              • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F9A
                                                                                                • Part of subcall function 004230C8: GetDC.USER32(00000000), ref: 0042311E
                                                                                                • Part of subcall function 004230C8: EnumFontsA.GDI32(00000000,00000000,00423068,00410460,00000000,?,?,00000000,?,00418FD3,00000000,?,?,?,00000001), ref: 00423131
                                                                                                • Part of subcall function 004230C8: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00423139
                                                                                                • Part of subcall function 004230C8: ReleaseDC.USER32(00000000,00000000), ref: 00423144
                                                                                                • Part of subcall function 0042368C: LoadIconA.USER32(00400000,MAINICON), ref: 0042371C
                                                                                                • Part of subcall function 0042368C: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 00423749
                                                                                                • Part of subcall function 0042368C: OemToCharA.USER32(?,?), ref: 0042375C
                                                                                                • Part of subcall function 0042368C: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 0042379C
                                                                                                • Part of subcall function 0041F118: GetVersion.KERNEL32(?,00418FF0,00000000,?,?,?,00000001), ref: 0041F126
                                                                                                • Part of subcall function 0041F118: SetErrorMode.KERNEL32(00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F142
                                                                                                • Part of subcall function 0041F118: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F14E
                                                                                                • Part of subcall function 0041F118: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F15C
                                                                                                • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F18C
                                                                                                • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1B5
                                                                                                • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1CA
                                                                                                • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1DF
                                                                                                • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F1F4
                                                                                                • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F209
                                                                                                • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F21E
                                                                                                • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F233
                                                                                                • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F248
                                                                                                • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F25D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$AtomCharCurrentErrorGlobalLoadMode$CapsDeviceEnumFileFontsIconLibraryLowerModuleNameProcessReleaseThreadVersion
                                                                                              • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                                                                                              • API String ID: 316262546-2767913252
                                                                                              • Opcode ID: b417f06b73a7dba032b12b865c8ed9bc6bb92a8bfb887f153b822e9fb73695be
                                                                                              • Instruction ID: d883a59e21ed3b4d0722d018b4a025de81f9e45e1fd093e44b5ebaba0e30331f
                                                                                              • Opcode Fuzzy Hash: b417f06b73a7dba032b12b865c8ed9bc6bb92a8bfb887f153b822e9fb73695be
                                                                                              • Instruction Fuzzy Hash: AC115E706142419AD740FF76A94235A7BE1DF64308F40943FF448A7391DB3DA9448B5F
                                                                                              APIs
                                                                                              • SetWindowLongA.USER32(?,000000FC,?), ref: 00413664
                                                                                              • GetWindowLongA.USER32(?,000000F0), ref: 0041366F
                                                                                              • GetWindowLongA.USER32(?,000000F4), ref: 00413681
                                                                                              • SetWindowLongA.USER32(?,000000F4,?), ref: 00413694
                                                                                              • SetPropA.USER32(?,00000000,00000000), ref: 004136AB
                                                                                              • SetPropA.USER32(?,00000000,00000000), ref: 004136C2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: LongWindow$Prop
                                                                                              • String ID:
                                                                                              • API String ID: 3887896539-0
                                                                                              • Opcode ID: 7846fecbe383e6d7fdaea4169180c186d89bab15e88d328ea810806c298c4441
                                                                                              • Instruction ID: 06abc153636d574f2b9d5b42ed2ef1d3d1989bf2b09c04f5b7aa0ee96fd2bcf7
                                                                                              • Opcode Fuzzy Hash: 7846fecbe383e6d7fdaea4169180c186d89bab15e88d328ea810806c298c4441
                                                                                              • Instruction Fuzzy Hash: 1011C975100244BFEF00DF9DDC84EDA37E8EB19364F144666B958DB2A2D738DD908B68
                                                                                              APIs
                                                                                                • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                              • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,0045586F,?,00000000,004558AF), ref: 004557B5
                                                                                              Strings
                                                                                              • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455738
                                                                                              • PendingFileRenameOperations2, xrefs: 00455784
                                                                                              • PendingFileRenameOperations, xrefs: 00455754
                                                                                              • WININIT.INI, xrefs: 004557E4
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseOpen
                                                                                              • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                                                                                              • API String ID: 47109696-2199428270
                                                                                              • Opcode ID: 430bb035026106b65f85e2b07525b73901b650abba9068f13605831850c1f819
                                                                                              • Instruction ID: 0fa1da25f67206326559771d92c7e47b52ca8d856d575cc5f046ac455f5bab2a
                                                                                              • Opcode Fuzzy Hash: 430bb035026106b65f85e2b07525b73901b650abba9068f13605831850c1f819
                                                                                              • Instruction Fuzzy Hash: FF51A974E006089FDB10EF61DC51AEEB7B9EF44305F50857BEC04A7292DB78AE49CA58
                                                                                              APIs
                                                                                              • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,0047CCEA,?,?,00000000,0049B628,00000000,00000000,?,00498539,00000000,004986E2,?,00000000), ref: 0047CC27
                                                                                              • GetLastError.KERNEL32(00000000,00000000,00000000,0047CCEA,?,?,00000000,0049B628,00000000,00000000,?,00498539,00000000,004986E2,?,00000000), ref: 0047CC30
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateDirectoryErrorLast
                                                                                              • String ID: Created temporary directory: $\_setup64.tmp$_isetup
                                                                                              • API String ID: 1375471231-2952887711
                                                                                              • Opcode ID: 18b8a6295044c03030742dd0e1a53df86680db30ea117cbe65252b99daff8b31
                                                                                              • Instruction ID: e6577b7b61f0e0a35e690824fc442bae28cfcbc8f9cba78cd8161ab2dbd6b5d1
                                                                                              • Opcode Fuzzy Hash: 18b8a6295044c03030742dd0e1a53df86680db30ea117cbe65252b99daff8b31
                                                                                              • Instruction Fuzzy Hash: E6412834A001099BDB11EFA5D882ADEB7B5EF45309F50843BE81577392DA38AE05CF68
                                                                                              APIs
                                                                                              • EnumWindows.USER32(00423A1C), ref: 00423AA8
                                                                                              • GetWindow.USER32(?,00000003), ref: 00423ABD
                                                                                              • GetWindowLongA.USER32(?,000000EC), ref: 00423ACC
                                                                                              • SetWindowPos.USER32(00000000,\AB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241AB,?,?,00423D73), ref: 00423B02
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$EnumLongWindows
                                                                                              • String ID: \AB
                                                                                              • API String ID: 4191631535-3948367934
                                                                                              • Opcode ID: 1f387ac1e946b45dcea70a74dde1e3cf145931a60cd8f654a7309261af8d74ee
                                                                                              • Instruction ID: 3ad81c14f5822e14e615a382c86082b2427cd388a5bf15486a3129e996868218
                                                                                              • Opcode Fuzzy Hash: 1f387ac1e946b45dcea70a74dde1e3cf145931a60cd8f654a7309261af8d74ee
                                                                                              • Instruction Fuzzy Hash: D6115E70700610ABDB109F28E885F5677E8EB08715F10026AF994AB2E3C378ED41CB59
                                                                                              APIs
                                                                                              • RegDeleteKeyA.ADVAPI32(?,00000000), ref: 0042DE50
                                                                                              • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042DFEB,00000000,0042E003), ref: 0042DE6B
                                                                                              • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DE71
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressDeleteHandleModuleProc
                                                                                              • String ID: RegDeleteKeyExA$advapi32.dll
                                                                                              • API String ID: 588496660-1846899949
                                                                                              • Opcode ID: ed1542cdc99e60fdc1e6205037aed1b156b4601bf62b1d4fa5b097ff81e7402e
                                                                                              • Instruction ID: e7246de0df94fba710dd2820c0ca51643d5dd29c3ac0bea476bad59fd0e01b91
                                                                                              • Opcode Fuzzy Hash: ed1542cdc99e60fdc1e6205037aed1b156b4601bf62b1d4fa5b097ff81e7402e
                                                                                              • Instruction Fuzzy Hash: 73E06DF1B41B30AAD72022657C8ABA33729DB75365F658437F105AD19183FC2C50CE9D
                                                                                              Strings
                                                                                              • PrepareToInstall failed: %s, xrefs: 0046BE6E
                                                                                              • NextButtonClick, xrefs: 0046BC4C
                                                                                              • Need to restart Windows? %s, xrefs: 0046BE95
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: Need to restart Windows? %s$NextButtonClick$PrepareToInstall failed: %s
                                                                                              • API String ID: 0-2329492092
                                                                                              • Opcode ID: bdd1d04c3163942a70fe70ce9c3da0cdba0d450c43b562cfb8d9ec13df8274e7
                                                                                              • Instruction ID: 9de4db1b3e70fdebeced0fe060001c857bcfdee1b2562a0b259a97201065334e
                                                                                              • Opcode Fuzzy Hash: bdd1d04c3163942a70fe70ce9c3da0cdba0d450c43b562cfb8d9ec13df8274e7
                                                                                              • Instruction Fuzzy Hash: 46D12F34A00108DFCB14EB99D985AED77F5EF49304F5440BAE404EB362D778AE85CB9A
                                                                                              APIs
                                                                                              • SetActiveWindow.USER32(?,?,00000000,004833D5), ref: 004831A8
                                                                                              • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 00483246
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ActiveChangeNotifyWindow
                                                                                              • String ID: $Need to restart Windows? %s
                                                                                              • API String ID: 1160245247-4200181552
                                                                                              • Opcode ID: ba5f16efbf0dbfb38810013a5ff400e29d778abd1c5f4a70b5438b3cc2cf9249
                                                                                              • Instruction ID: 855c298393525188f16043e43c8caa20abfdb27870bda8f6eb76b0fac02994d3
                                                                                              • Opcode Fuzzy Hash: ba5f16efbf0dbfb38810013a5ff400e29d778abd1c5f4a70b5438b3cc2cf9249
                                                                                              • Instruction Fuzzy Hash: 7E918F34A042449FDB10EF69D8C6BAD77E0AF55708F5484BBE8009B362DB78AE05CB5D
                                                                                              APIs
                                                                                                • Part of subcall function 0042C804: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C828
                                                                                              • GetLastError.KERNEL32(00000000,0046FCD9,?,?,0049C1E0,00000000), ref: 0046FBB6
                                                                                              • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046FC30
                                                                                              • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046FC55
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ChangeNotify$ErrorFullLastNamePath
                                                                                              • String ID: Creating directory: %s
                                                                                              • API String ID: 2451617938-483064649
                                                                                              • Opcode ID: 4e90ae3be4d00617aa2a0205853b4e8de3d2b048484072f4623b0078b04ad6be
                                                                                              • Instruction ID: a145aa70eb484b5d007d33f2831cd5d1f219efd535f83afbcf26a903565c5eea
                                                                                              • Opcode Fuzzy Hash: 4e90ae3be4d00617aa2a0205853b4e8de3d2b048484072f4623b0078b04ad6be
                                                                                              • Instruction Fuzzy Hash: 7D512F74E00248ABDB01DBA5D982ADEBBF4AF49304F50847AEC50B7382D7795E08CB59
                                                                                              APIs
                                                                                              • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 00454E82
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,00454F48), ref: 00454EEC
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressByteCharMultiProcWide
                                                                                              • String ID: SfcIsFileProtected$sfc.dll
                                                                                              • API String ID: 2508298434-591603554
                                                                                              • Opcode ID: bb559eb6b427547f50ac361efa45694dce53a5facbc0d321e4ca2111cb35c873
                                                                                              • Instruction ID: 709c5f55a6f5f8285c9c61fd8393730e8027effee09c5548c71846991cac34f0
                                                                                              • Opcode Fuzzy Hash: bb559eb6b427547f50ac361efa45694dce53a5facbc0d321e4ca2111cb35c873
                                                                                              • Instruction Fuzzy Hash: E8419671A04318DBEB20EF59DC85B9DB7B8AB4430DF5041B7A908A7293D7785F88CA1C
                                                                                              APIs
                                                                                              • GetClassInfoA.USER32(00400000,?,?), ref: 0041647F
                                                                                              • UnregisterClassA.USER32(?,00400000), ref: 004164AB
                                                                                              • RegisterClassA.USER32(?), ref: 004164CE
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Class$InfoRegisterUnregister
                                                                                              • String ID: @
                                                                                              • API String ID: 3749476976-2766056989
                                                                                              • Opcode ID: df6e090dea74baa5ac925230d828a7230e5c2d53f0976f0f8597eebaced2b944
                                                                                              • Instruction ID: c77080f262680b7bd3c4c6a37e0a11d074b1995aa9dd52ebf92fb76dd285a693
                                                                                              • Opcode Fuzzy Hash: df6e090dea74baa5ac925230d828a7230e5c2d53f0976f0f8597eebaced2b944
                                                                                              • Instruction Fuzzy Hash: B8316D702042409BD720EF69C981B9B77E5AB89308F04457FF949DB392DB39DD44CB6A
                                                                                              APIs
                                                                                              • 754B1520.VERSION(00000000,?,?,?,?), ref: 00452530
                                                                                              • 754B1500.VERSION(00000000,?,00000000,?,00000000,004525AB,?,00000000,?,?,?,?), ref: 0045255D
                                                                                              • 754B1540.VERSION(?,004525D4,?,?,00000000,?,00000000,?,00000000,004525AB,?,00000000,?,?,?,?), ref: 00452577
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: B1500B1520B1540
                                                                                              • String ID: %E
                                                                                              • API String ID: 624677603-175436132
                                                                                              • Opcode ID: f18440ec30d6a8502c14f0dca7f1c7caee1af709ad5b943411f89d38bbe9f821
                                                                                              • Instruction ID: f5dca5bfdad9659449235e2d7a4f424f1fde127461be4d93bb02e754cc996b3f
                                                                                              • Opcode Fuzzy Hash: f18440ec30d6a8502c14f0dca7f1c7caee1af709ad5b943411f89d38bbe9f821
                                                                                              • Instruction Fuzzy Hash: D2218331A00608BFDB01DAA989519AFB7FCEB4A300F554477F800E7242E6B9AE04C765
                                                                                              APIs
                                                                                              • GetDC.USER32(00000000), ref: 0044B401
                                                                                              • SelectObject.GDI32(?,00000000), ref: 0044B424
                                                                                              • ReleaseDC.USER32(00000000,?), ref: 0044B457
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ObjectReleaseSelect
                                                                                              • String ID: %H
                                                                                              • API String ID: 1831053106-1959103961
                                                                                              • Opcode ID: 613a86eb96bd964688756472f8397141eb38d2c4caf6b0936a0a8cf616000036
                                                                                              • Instruction ID: 242bcfed98594cbdcf51f2854abe94a1ec69c13560e3a72339b9f4254961cc58
                                                                                              • Opcode Fuzzy Hash: 613a86eb96bd964688756472f8397141eb38d2c4caf6b0936a0a8cf616000036
                                                                                              • Instruction Fuzzy Hash: 62216570A04248AFEB15DFA6C841B9F7BB9DB49304F11806AF904A7682D778D940CB59
                                                                                              APIs
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0044B14C,?,%H,?,?), ref: 0044B11E
                                                                                              • DrawTextW.USER32(?,?,00000000,?,?), ref: 0044B131
                                                                                              • DrawTextA.USER32(?,00000000,00000000,?,?), ref: 0044B165
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: DrawText$ByteCharMultiWide
                                                                                              • String ID: %H
                                                                                              • API String ID: 65125430-1959103961
                                                                                              • Opcode ID: b9978a40832644be7eb99ff61e6ae739c3599586bb389d309c0d7579617ef2e1
                                                                                              • Instruction ID: fec6fabf6d030a51aab30bc406273ff78954f96defe81b00f374268ef7e1f253
                                                                                              • Opcode Fuzzy Hash: b9978a40832644be7eb99ff61e6ae739c3599586bb389d309c0d7579617ef2e1
                                                                                              • Instruction Fuzzy Hash: 2A11CBB27046047FEB00DB6A9C91D6F77ECDB49750F10817BF504D72D0D6399E018669
                                                                                              APIs
                                                                                              • SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDC5
                                                                                                • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                                                                • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                                                                                                • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                                                                                              • GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDA8
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressAutoCompleteDirectoryErrorLibraryLoadModeProcSystem
                                                                                              • String ID: SHAutoComplete$shlwapi.dll
                                                                                              • API String ID: 395431579-1506664499
                                                                                              • Opcode ID: 42f9dcb05abbf77f41298dba7160eccf52289638d4fdae2cac913a0c4d077c72
                                                                                              • Instruction ID: e807f919b0f5f47641bb36d66eaae5ab4e0d2818c3cb02d7dc2bc8906116ae4e
                                                                                              • Opcode Fuzzy Hash: 42f9dcb05abbf77f41298dba7160eccf52289638d4fdae2cac913a0c4d077c72
                                                                                              • Instruction Fuzzy Hash: 3311A330B00319BBD711EB62FD85B8E7BA8DB55704F90447BF40066291DBB8AE05C65D
                                                                                              APIs
                                                                                                • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                              • RegCloseKey.ADVAPI32(?,00455A7B,?,00000001,00000000), ref: 00455A6E
                                                                                              Strings
                                                                                              • PendingFileRenameOperations, xrefs: 00455A40
                                                                                              • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455A1C
                                                                                              • PendingFileRenameOperations2, xrefs: 00455A4F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseOpen
                                                                                              • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                                                                                              • API String ID: 47109696-2115312317
                                                                                              • Opcode ID: 336a8554af3216e9fad4f98949cc8fac3f30a8fbf7097481dd1a9e766711aba3
                                                                                              • Instruction ID: e9356c19d9a7d2c1b22529064790e486fb2be540b5bf165494b3782c633fa2c0
                                                                                              • Opcode Fuzzy Hash: 336a8554af3216e9fad4f98949cc8fac3f30a8fbf7097481dd1a9e766711aba3
                                                                                              • Instruction Fuzzy Hash: A3F0F671304A08BFDB04D661DC62A3B739CE744725FB08167F800CB682EA7CBD04915C
                                                                                              APIs
                                                                                              • FindNextFileA.KERNEL32(000000FF,?,00000000,00472325,?,00000000,?,0049C1E0,00000000,00472515,?,00000000,?,00000000,?,004726E1), ref: 00472301
                                                                                              • FindClose.KERNEL32(000000FF,0047232C,00472325,?,00000000,?,0049C1E0,00000000,00472515,?,00000000,?,00000000,?,004726E1,?), ref: 0047231F
                                                                                              • FindNextFileA.KERNEL32(000000FF,?,00000000,00472447,?,00000000,?,0049C1E0,00000000,00472515,?,00000000,?,00000000,?,004726E1), ref: 00472423
                                                                                              • FindClose.KERNEL32(000000FF,0047244E,00472447,?,00000000,?,0049C1E0,00000000,00472515,?,00000000,?,00000000,?,004726E1,?), ref: 00472441
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Find$CloseFileNext
                                                                                              • String ID:
                                                                                              • API String ID: 2066263336-0
                                                                                              • Opcode ID: 5852171562c0697583dfb39d2e83bd074d15792751f52c1309e6650eed3a72c0
                                                                                              • Instruction ID: ff38abb04fb96460afd2c3532f2e87b2ffc4f25b99c166b2ff4046d92e8ebf4f
                                                                                              • Opcode Fuzzy Hash: 5852171562c0697583dfb39d2e83bd074d15792751f52c1309e6650eed3a72c0
                                                                                              • Instruction Fuzzy Hash: 3EC14C3490424D9FCF11DFA5C981ADEBBB8FF49304F5080AAE808B3251D7789A46CF58
                                                                                              APIs
                                                                                              • FindNextFileA.KERNEL32(000000FF,?,?,?,?,00000000,0047FEF1,?,00000000,00000000,?,?,00481147,?,?,00000000), ref: 0047FD9E
                                                                                              • FindClose.KERNEL32(000000FF,000000FF,?,?,?,?,00000000,0047FEF1,?,00000000,00000000,?,?,00481147,?,?), ref: 0047FDAB
                                                                                              • FindNextFileA.KERNEL32(000000FF,?,00000000,0047FEC4,?,?,?,?,00000000,0047FEF1,?,00000000,00000000,?,?,00481147), ref: 0047FEA0
                                                                                              • FindClose.KERNEL32(000000FF,0047FECB,0047FEC4,?,?,?,?,00000000,0047FEF1,?,00000000,00000000,?,?,00481147,?), ref: 0047FEBE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Find$CloseFileNext
                                                                                              • String ID:
                                                                                              • API String ID: 2066263336-0
                                                                                              • Opcode ID: 56ee50c7cb7fa2545e62f1cc5d9b880787f4aaf8996287a3801f00069153f90f
                                                                                              • Instruction ID: 5570db9595827249690d4c596f970be035a6cb65fb6c4bc3b070d2a6e7e06d26
                                                                                              • Opcode Fuzzy Hash: 56ee50c7cb7fa2545e62f1cc5d9b880787f4aaf8996287a3801f00069153f90f
                                                                                              • Instruction Fuzzy Hash: 34512D71A006499FCB21DF65CC45ADEB7B8EB88319F1084BAA818A7351D7389F89CF54
                                                                                              APIs
                                                                                              • GetMenu.USER32(00000000), ref: 00421361
                                                                                              • SetMenu.USER32(00000000,00000000), ref: 0042137E
                                                                                              • SetMenu.USER32(00000000,00000000), ref: 004213B3
                                                                                              • SetMenu.USER32(00000000,00000000), ref: 004213CF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu
                                                                                              • String ID:
                                                                                              • API String ID: 3711407533-0
                                                                                              • Opcode ID: 011238806e8749de4259267c2425fab43e1a23b2a7ed20fe69ece2c0c4e48eae
                                                                                              • Instruction ID: 68e231870b0c3442489bede8fdcf2aa1db34e154331db007d9f14f65c1163b63
                                                                                              • Opcode Fuzzy Hash: 011238806e8749de4259267c2425fab43e1a23b2a7ed20fe69ece2c0c4e48eae
                                                                                              • Instruction Fuzzy Hash: 4641AE3070425447EB20EA3AA9857AB36925B20308F4841BFFC40DF7A3CA7CDD45839D
                                                                                              APIs
                                                                                              • SendMessageA.USER32(?,?,?,?), ref: 00416B84
                                                                                              • SetTextColor.GDI32(?,00000000), ref: 00416B9E
                                                                                              • SetBkColor.GDI32(?,00000000), ref: 00416BB8
                                                                                              • CallWindowProcA.USER32(?,?,?,?,?), ref: 00416BE0
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Color$CallMessageProcSendTextWindow
                                                                                              • String ID:
                                                                                              • API String ID: 601730667-0
                                                                                              • Opcode ID: 072521f5090f240ceba025e33949739ce14f97652003165ca459573163e57643
                                                                                              • Instruction ID: 4ea48ea5c9b96bae81565ca4ce64eb356f32bd46963e120bc97d04dec40f2685
                                                                                              • Opcode Fuzzy Hash: 072521f5090f240ceba025e33949739ce14f97652003165ca459573163e57643
                                                                                              • Instruction Fuzzy Hash: BC115171705604AFD710EE6ECC84E8777ECEF49310715887EB959CB612C638F8418B69
                                                                                              APIs
                                                                                              • GetDC.USER32(00000000), ref: 0042311E
                                                                                              • EnumFontsA.GDI32(00000000,00000000,00423068,00410460,00000000,?,?,00000000,?,00418FD3,00000000,?,?,?,00000001), ref: 00423131
                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00423139
                                                                                              • ReleaseDC.USER32(00000000,00000000), ref: 00423144
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CapsDeviceEnumFontsRelease
                                                                                              • String ID:
                                                                                              • API String ID: 2698912916-0
                                                                                              • Opcode ID: ae3b46bdf4144dece9088701a44aa945a4d7eb571b2044da6dc5baa79edeb2ca
                                                                                              • Instruction ID: a9d24610abdaa6694e735d00c6d38f20457f2ac5f1468c421a1b182fb2ef8db9
                                                                                              • Opcode Fuzzy Hash: ae3b46bdf4144dece9088701a44aa945a4d7eb571b2044da6dc5baa79edeb2ca
                                                                                              • Instruction Fuzzy Hash: 8D01CC716042102AE700BF6A5C82B9B3AA49F01319F40027BF808AA3C6DA7E980547AE
                                                                                              APIs
                                                                                                • Part of subcall function 0045092C: SetEndOfFile.KERNEL32(?,?,0045C342,00000000,0045C4CD,?,00000000,00000002,00000002), ref: 00450933
                                                                                              • FlushFileBuffers.KERNEL32(?), ref: 0045C499
                                                                                              Strings
                                                                                              • NumRecs range exceeded, xrefs: 0045C396
                                                                                              • EndOffset range exceeded, xrefs: 0045C3CD
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$BuffersFlush
                                                                                              • String ID: EndOffset range exceeded$NumRecs range exceeded
                                                                                              • API String ID: 3593489403-659731555
                                                                                              • Opcode ID: 7579bb90891bfddca92618b6050c99dc039493a8a69e6275f659694612805aa2
                                                                                              • Instruction ID: 69b4fe9c868b7cadc716880164946defc5db249b4b2908964217ac1dcc813941
                                                                                              • Opcode Fuzzy Hash: 7579bb90891bfddca92618b6050c99dc039493a8a69e6275f659694612805aa2
                                                                                              • Instruction Fuzzy Hash: 4F617334A002588FDB25DF25C891AD9B7B5AF49305F0084DAED88AB353D674AEC8CF54
                                                                                              APIs
                                                                                                • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,00498BB6), ref: 0040334B
                                                                                                • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,00498BB6), ref: 00403356
                                                                                                • Part of subcall function 0040631C: GetModuleHandleA.KERNEL32(kernel32.dll,?,00498BC0), ref: 00406322
                                                                                                • Part of subcall function 0040631C: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040632F
                                                                                                • Part of subcall function 0040631C: GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00406345
                                                                                                • Part of subcall function 0040631C: GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 0040635B
                                                                                                • Part of subcall function 0040631C: SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498BC0), ref: 00406366
                                                                                                • Part of subcall function 004063C4: 6FCB1CD0.COMCTL32(00498BC5), ref: 004063C4
                                                                                                • Part of subcall function 00410764: GetCurrentThreadId.KERNEL32 ref: 004107B2
                                                                                                • Part of subcall function 00419040: GetVersion.KERNEL32(00498BDE), ref: 00419040
                                                                                                • Part of subcall function 0044F744: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,00498BF2), ref: 0044F77F
                                                                                                • Part of subcall function 0044F744: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F785
                                                                                                • Part of subcall function 0044FC10: GetVersionExA.KERNEL32(0049B790,00498BF7), ref: 0044FC1F
                                                                                                • Part of subcall function 004531F0: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498C06), ref: 00453210
                                                                                                • Part of subcall function 004531F0: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453216
                                                                                                • Part of subcall function 004531F0: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498C06), ref: 0045322A
                                                                                                • Part of subcall function 004531F0: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453230
                                                                                                • Part of subcall function 004570B4: GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 004570D8
                                                                                                • Part of subcall function 004645F4: LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00498C1A), ref: 00464603
                                                                                                • Part of subcall function 004645F4: GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464609
                                                                                                • Part of subcall function 0046CDF0: GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046CE05
                                                                                                • Part of subcall function 00478C20: GetModuleHandleA.KERNEL32(kernel32.dll,?,00498C24), ref: 00478C26
                                                                                                • Part of subcall function 00478C20: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478C33
                                                                                                • Part of subcall function 00478C20: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478C43
                                                                                                • Part of subcall function 00483F88: GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 00484077
                                                                                                • Part of subcall function 00495BB4: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 00495BCD
                                                                                              • SetErrorMode.KERNEL32(00000001,00000000,00498C6C), ref: 00498C3E
                                                                                                • Part of subcall function 00498968: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498C48,00000001,00000000,00498C6C), ref: 00498972
                                                                                                • Part of subcall function 00498968: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498978
                                                                                                • Part of subcall function 004244D4: SendMessageA.USER32(?,0000B020,00000000,?), ref: 004244F3
                                                                                                • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
                                                                                              • ShowWindow.USER32(?,00000005,00000000,00498C6C), ref: 00498C9F
                                                                                                • Part of subcall function 004825C8: SetActiveWindow.USER32(?), ref: 00482676
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$HandleModule$Window$Version$ActiveClipboardCommandCurrentErrorFormatLibraryLineLoadMessageModePolicyProcessRegisterSendShowTextThread
                                                                                              • String ID: Setup
                                                                                              • API String ID: 504348408-3839654196
                                                                                              • Opcode ID: 1594606edc507442c6549f9e4ebdc225aad6ad90dc9fc57b5479ce1c0ac5814d
                                                                                              • Instruction ID: b535e719d7157e93998cc10f536158ae488692691c8c4e2dacdcbf5c7207fd3e
                                                                                              • Opcode Fuzzy Hash: 1594606edc507442c6549f9e4ebdc225aad6ad90dc9fc57b5479ce1c0ac5814d
                                                                                              • Instruction Fuzzy Hash: 873104312446409FD601BBBBFD5392D3B94EF8A728B91447FF80496693DE3C68508A7E
                                                                                              APIs
                                                                                              • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,0042DD38), ref: 0042DC3C
                                                                                              • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,0042DD38), ref: 0042DCAC
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: QueryValue
                                                                                              • String ID: $=H
                                                                                              • API String ID: 3660427363-3538597426
                                                                                              • Opcode ID: b62dc44b296d1c54c0416b8d239270b5fe200a79a82432283709fd1da487490f
                                                                                              • Instruction ID: 5bd1c55a509b6dee259ffcee94d68868fe84ce326e73fb4cf6662c4527ef549e
                                                                                              • Opcode Fuzzy Hash: b62dc44b296d1c54c0416b8d239270b5fe200a79a82432283709fd1da487490f
                                                                                              • Instruction Fuzzy Hash: 9D414171E00529ABDB11DF95D881BAFB7B8EB04704F918466E810F7241D778AE00CBA5
                                                                                              APIs
                                                                                              • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00453B13,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A6A
                                                                                              • GetLastError.KERNEL32(00000000,00000000,?,00000000,00453B13,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A73
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateDirectoryErrorLast
                                                                                              • String ID: .tmp
                                                                                              • API String ID: 1375471231-2986845003
                                                                                              • Opcode ID: 4f6049b6d10a737b279f92eac6e2edda550f3c0c3ab583747f9ca22f4cbd9d09
                                                                                              • Instruction ID: 2c169793aa1d4e8b0ae54453200dd0eeecd34c8d921a2c5b894f13e1de3ec917
                                                                                              • Opcode Fuzzy Hash: 4f6049b6d10a737b279f92eac6e2edda550f3c0c3ab583747f9ca22f4cbd9d09
                                                                                              • Instruction Fuzzy Hash: BD213575A002089BDB01EFA5C8429DEB7B8EF49305F50457BE801B7343DA3CAF058B69
                                                                                              APIs
                                                                                                • Part of subcall function 00483A7C: GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00483A8D
                                                                                                • Part of subcall function 00483A7C: GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00483A9A
                                                                                                • Part of subcall function 00483A7C: GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483AA8
                                                                                                • Part of subcall function 00483A7C: GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483AB0
                                                                                                • Part of subcall function 00483A7C: GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00483ABC
                                                                                                • Part of subcall function 00483A7C: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00483ADD
                                                                                                • Part of subcall function 00483A7C: GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483AF0
                                                                                                • Part of subcall function 00483A7C: GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483AF6
                                                                                                • Part of subcall function 00483DA8: GetVersionExA.KERNEL32(?,00483FBA,00000000,0048408F,?,?,?,?,?,00498C29), ref: 00483DB6
                                                                                                • Part of subcall function 00483DA8: GetVersionExA.KERNEL32(0000009C,?,00483FBA,00000000,0048408F,?,?,?,?,?,00498C29), ref: 00483E08
                                                                                                • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                                                                                                • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                                                                                              • GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 00484077
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$HandleModuleVersion$CurrentErrorInfoLibraryLoadModeNativeProcessSystem
                                                                                              • String ID: SHGetKnownFolderPath$shell32.dll
                                                                                              • API String ID: 3869789854-2936008475
                                                                                              • Opcode ID: 24bfbd8baf235fcbd7404033d7799f009542697b8823181e059981251f96c700
                                                                                              • Instruction ID: 8066e8dcbdf9c94243579ba2519058cd674f052446347c20ec70bbddfecd8a90
                                                                                              • Opcode Fuzzy Hash: 24bfbd8baf235fcbd7404033d7799f009542697b8823181e059981251f96c700
                                                                                              • Instruction Fuzzy Hash: 1021F1B06103116AC700BFBE599611B3BA5EB9570C380893FF904DB391D77E68149B6E
                                                                                              APIs
                                                                                              • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,0047C92C,00000000,0047C942), ref: 0047C63A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Close
                                                                                              • String ID: RegisteredOrganization$RegisteredOwner
                                                                                              • API String ID: 3535843008-1113070880
                                                                                              • Opcode ID: fe32ea5757c181cea0fad4739291adb7fe5cb56e5df920aee23c3361bee12acf
                                                                                              • Instruction ID: 97ba07fcc0924f8d698b93a4c32f8f7a3ceb81663af41ec066a5e596666b9838
                                                                                              • Opcode Fuzzy Hash: fe32ea5757c181cea0fad4739291adb7fe5cb56e5df920aee23c3361bee12acf
                                                                                              • Instruction Fuzzy Hash: F5F09060700204ABEB00D6A8ACD2BAA3769D750304F60907FA1058F382C679EE019B5C
                                                                                              APIs
                                                                                              • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,00475483), ref: 00475271
                                                                                              • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,00475483), ref: 00475288
                                                                                                • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseCreateErrorFileHandleLast
                                                                                              • String ID: CreateFile
                                                                                              • API String ID: 2528220319-823142352
                                                                                              • Opcode ID: 2c7b4fae504844472e6a07c4f0bcfda842c0d735d71c8af9ff6e211e096a353b
                                                                                              • Instruction ID: b0794b45f16520e4762b2717541816a935241bfc2e667b83be7f23d95be3de9d
                                                                                              • Opcode Fuzzy Hash: 2c7b4fae504844472e6a07c4f0bcfda842c0d735d71c8af9ff6e211e096a353b
                                                                                              • Instruction Fuzzy Hash: 99E06D702403447FEA10FA69CCC6F4A77989B04728F10C152BA48AF3E3C5B9FC808A58
                                                                                              APIs
                                                                                              • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Open
                                                                                              • String ID: System\CurrentControlSet\Control\Windows$;H
                                                                                              • API String ID: 71445658-2565060666
                                                                                              • Opcode ID: a11f376e1d034aeb0d9ae53f60934921bcd728bb93d306f1768079d63b1ffdfe
                                                                                              • Instruction ID: 60e43675bb36a9eef4a15598a1848ca3f705ecc445ee8c9fe52fc6b05f1352bb
                                                                                              • Opcode Fuzzy Hash: a11f376e1d034aeb0d9ae53f60934921bcd728bb93d306f1768079d63b1ffdfe
                                                                                              • Instruction Fuzzy Hash: 29D09E72950128BB9B009A89DC41DFB775DDB15760F45441BF9049B141C5B4AC5197E4
                                                                                              APIs
                                                                                                • Part of subcall function 00457044: CoInitialize.OLE32(00000000), ref: 0045704A
                                                                                                • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                                                                                                • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                                                                                              • GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 004570D8
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressErrorInitializeLibraryLoadModeProc
                                                                                              • String ID: SHCreateItemFromParsingName$shell32.dll
                                                                                              • API String ID: 2906209438-2320870614
                                                                                              • Opcode ID: 9d30f7af3022304e39d9007edb753d7b8512de14ad0f58a0e87bb64db50414c6
                                                                                              • Instruction ID: 7fba65882f7194314ab185764ebfac318737a269d5660949bdaf7135ffc1064c
                                                                                              • Opcode Fuzzy Hash: 9d30f7af3022304e39d9007edb753d7b8512de14ad0f58a0e87bb64db50414c6
                                                                                              • Instruction Fuzzy Hash: ECC08CA074860093CB40B3FA344320E1841AB8071FB10C07F7A04A66C7DE3C88088B2E
                                                                                              APIs
                                                                                                • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                                                                                                • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                                                                                              • GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046CE05
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressErrorLibraryLoadModeProc
                                                                                              • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                                              • API String ID: 2492108670-2683653824
                                                                                              • Opcode ID: 4f35c33f472421c4948a2ce6cac4f72f28d005e98571f32e7a9733a845a9f857
                                                                                              • Instruction ID: c0603f0a452a360a01ce82207306765f02b8a986224f2e77b24b084cc810d505
                                                                                              • Opcode Fuzzy Hash: 4f35c33f472421c4948a2ce6cac4f72f28d005e98571f32e7a9733a845a9f857
                                                                                              • Instruction Fuzzy Hash: 44B092A060074086DB40B7A298D262B28269740319B20843BB0CC9BA95EB3E88240B9F
                                                                                              APIs
                                                                                              • LoadLibraryExA.KERNEL32(00000000,00000000,00000008,?,?,00000000,00448709), ref: 0044864C
                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 004486CD
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressLibraryLoadProc
                                                                                              • String ID:
                                                                                              • API String ID: 2574300362-0
                                                                                              • Opcode ID: 36521cdfc13aba0ae9c44214f12a2e14552a0dd36018004eb1372d311063bccb
                                                                                              • Instruction ID: 2eaa58f6359003fef9dee836e3db1fa56ae38c906bc4f4c4d93ca6671f7cd4fb
                                                                                              • Opcode Fuzzy Hash: 36521cdfc13aba0ae9c44214f12a2e14552a0dd36018004eb1372d311063bccb
                                                                                              • Instruction Fuzzy Hash: 14515470E00105AFDB40EF95C491AAEBBF9EB45319F11817FE414BB391DA389E05CB99
                                                                                              APIs
                                                                                              • GetSystemMenu.USER32(00000000,00000000,00000000,00481DB4), ref: 00481D4C
                                                                                              • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 00481D5D
                                                                                              • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00481D75
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$Append$System
                                                                                              • String ID:
                                                                                              • API String ID: 1489644407-0
                                                                                              • Opcode ID: 672145a2bbc7660003845448dd8fd579fca208d3c81716cd1fbd69936c4767aa
                                                                                              • Instruction ID: 44f8b16540ed1c6eecf525242fd074403e334eda66194076213ef08da8c10300
                                                                                              • Opcode Fuzzy Hash: 672145a2bbc7660003845448dd8fd579fca208d3c81716cd1fbd69936c4767aa
                                                                                              • Instruction Fuzzy Hash: 3431D4307043441AD721FB769C82BAE3A989F15318F54483FF901AB2E3CA7CAD09879D
                                                                                              APIs
                                                                                              • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00424412
                                                                                              • TranslateMessage.USER32(?), ref: 0042448F
                                                                                              • DispatchMessageA.USER32(?), ref: 00424499
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Message$DispatchPeekTranslate
                                                                                              • String ID:
                                                                                              • API String ID: 4217535847-0
                                                                                              • Opcode ID: d4f7142ddfb2041a0388c754ad29f8297397d1c5d5a6fc901d04af05902ad934
                                                                                              • Instruction ID: 8eae6dca0d2455523dd27ca57e4683f6da326f6f2f90499d04ddbfd693f83f9d
                                                                                              • Opcode Fuzzy Hash: d4f7142ddfb2041a0388c754ad29f8297397d1c5d5a6fc901d04af05902ad934
                                                                                              • Instruction Fuzzy Hash: E3116D303043205AEB20FA24A941B9F73D4DFC5758F80481EFC99972C2D77D9D49879A
                                                                                              APIs
                                                                                              • SetPropA.USER32(00000000,00000000), ref: 0041666A
                                                                                              • SetPropA.USER32(00000000,00000000), ref: 0041667F
                                                                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 004166A6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Prop$Window
                                                                                              • String ID:
                                                                                              • API String ID: 3363284559-0
                                                                                              • Opcode ID: 953367bc10487f5f00132df45b9f4bdc07709d3a3f88142737615a1cc8063318
                                                                                              • Instruction ID: 6913c5f2d07602d921388148e43cadd8ab2d6729f30613f48e4cae6714e3bc13
                                                                                              • Opcode Fuzzy Hash: 953367bc10487f5f00132df45b9f4bdc07709d3a3f88142737615a1cc8063318
                                                                                              • Instruction Fuzzy Hash: ACF01271701210ABDB10AB599C85FA732DCAB09714F16057AB905EF286C778DC40C7A8
                                                                                              APIs
                                                                                              • IsWindowVisible.USER32(?), ref: 0041EE64
                                                                                              • IsWindowEnabled.USER32(?), ref: 0041EE6E
                                                                                              • EnableWindow.USER32(?,00000000), ref: 0041EE94
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$EnableEnabledVisible
                                                                                              • String ID:
                                                                                              • API String ID: 3234591441-0
                                                                                              • Opcode ID: 495d6a49dc4b54b7e424eeae3cce025a94256eba33976185de8149e812397146
                                                                                              • Instruction ID: 3b4cb379701a2ac24b7d0c87bf9454d2e26b3d0fb89a85d5a5a22e513a73856b
                                                                                              • Opcode Fuzzy Hash: 495d6a49dc4b54b7e424eeae3cce025a94256eba33976185de8149e812397146
                                                                                              • Instruction Fuzzy Hash: EAE06DB5100301AAE301AB2BDC81B5B7A9CAB54350F05843BA9089B292D63ADC408B7C
                                                                                              APIs
                                                                                              • SetActiveWindow.USER32(?), ref: 0046A02D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ActiveWindow
                                                                                              • String ID: PrepareToInstall
                                                                                              • API String ID: 2558294473-1101760603
                                                                                              • Opcode ID: 75512e466bef58792cd12b8f356129037ecdd83b0312336bfaeea67d77f2dd49
                                                                                              • Instruction ID: c614f106b7f0b4f176116dff63491c2ec041d81708a05a15fd0d1780f22877a3
                                                                                              • Opcode Fuzzy Hash: 75512e466bef58792cd12b8f356129037ecdd83b0312336bfaeea67d77f2dd49
                                                                                              • Instruction Fuzzy Hash: 97A14934A00109DFCB00EF99D986EDEB7F5AF48304F5540B6E404AB362D738AE45CB9A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: /:*?"<>|
                                                                                              • API String ID: 0-4078764451
                                                                                              • Opcode ID: e5c60157bcf2278da473a52dbfa3e40327efacf8e8b2ac4b78b74c9d89147c88
                                                                                              • Instruction ID: 6c3526c54916fe71946563460b5bd12015a165326d65a32731909bc5939f884d
                                                                                              • Opcode Fuzzy Hash: e5c60157bcf2278da473a52dbfa3e40327efacf8e8b2ac4b78b74c9d89147c88
                                                                                              • Instruction Fuzzy Hash: CF71C370A40215BADB10E766DCD2FEE7BA19F05308F148067F580BB292E779AD458B4E
                                                                                              APIs
                                                                                              • SetActiveWindow.USER32(?), ref: 00482676
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ActiveWindow
                                                                                              • String ID: InitializeWizard
                                                                                              • API String ID: 2558294473-2356795471
                                                                                              • Opcode ID: 3626624f3147e861467950174f06d96ecabfee41a1c9b8d7b2440425271d24be
                                                                                              • Instruction ID: 0fabbc08dbff6a0894d12042e1c617afa12541eacf44f0b659f2bb150b55c2ae
                                                                                              • Opcode Fuzzy Hash: 3626624f3147e861467950174f06d96ecabfee41a1c9b8d7b2440425271d24be
                                                                                              • Instruction Fuzzy Hash: 8311C130204200AFD700EB69EED6B1A37E4E764328F60057BE404D72A1EA796C41CB5E
                                                                                              APIs
                                                                                                • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                              • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,0047C740,00000000,0047C942), ref: 0047C539
                                                                                              Strings
                                                                                              • Software\Microsoft\Windows\CurrentVersion, xrefs: 0047C509
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseOpen
                                                                                              • String ID: Software\Microsoft\Windows\CurrentVersion
                                                                                              • API String ID: 47109696-1019749484
                                                                                              • Opcode ID: 058bbab7ea9ec86a0dd33160b35f36364f977485e0abef3b7f9f2bc760079b92
                                                                                              • Instruction ID: acdf9366f140fa0c09696ff4b806567a5b27613a006b44f2785fa8682630d216
                                                                                              • Opcode Fuzzy Hash: 058bbab7ea9ec86a0dd33160b35f36364f977485e0abef3b7f9f2bc760079b92
                                                                                              • Instruction Fuzzy Hash: 6CF0823170052477DA00A65E6C82B9FA79D8B84758F60403FF508DB242EABAEE0243EC
                                                                                              APIs
                                                                                              • RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,0047620E,?,0049C1E0,?,0046F15B,?,00000000,0046F6F6,?,_is1), ref: 0046EE67
                                                                                              Strings
                                                                                              • Inno Setup: Setup Version, xrefs: 0046EE65
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Value
                                                                                              • String ID: Inno Setup: Setup Version
                                                                                              • API String ID: 3702945584-4166306022
                                                                                              • Opcode ID: 80676ca53bf8d59feef104d4bc7cb567c816a54b460bafb4a4ed583678a3f251
                                                                                              • Instruction ID: 37dbbd71146fd60ed96ba35b84ff74d599aeccd68d0f9eb37ee109455dfe34ad
                                                                                              • Opcode Fuzzy Hash: 80676ca53bf8d59feef104d4bc7cb567c816a54b460bafb4a4ed583678a3f251
                                                                                              • Instruction Fuzzy Hash: B1E06D753012043FE710AA2B9C85F5BBADCDF88365F10403AB908DB392D578DD0181A9
                                                                                              APIs
                                                                                              • RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F532,?,?,00000000,0046F6F6,?,_is1,?), ref: 0046EEC7
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Value
                                                                                              • String ID: NoModify
                                                                                              • API String ID: 3702945584-1699962838
                                                                                              • Opcode ID: f40bfeae81701b53243146576d0ffb0e6a468f93b3df03c8cd4f9f1e738a44cb
                                                                                              • Instruction ID: 84621f748531697c6bb4a8e0450a59e651a2caf9945441e4ffcb8bd5fa838dfd
                                                                                              • Opcode Fuzzy Hash: f40bfeae81701b53243146576d0ffb0e6a468f93b3df03c8cd4f9f1e738a44cb
                                                                                              • Instruction Fuzzy Hash: F6E04FB4640308BFEB04DB55CD4AF6B77ECDB48714F10405ABA049B281E674FE00C669
                                                                                              APIs
                                                                                              • GetACP.KERNEL32(?,?,00000001,00000000,0047E753,?,-0000001A,00480609,-00000010,?,00000004,0000001B,00000000,00480956,?,0045DB68), ref: 0047E4EA
                                                                                                • Part of subcall function 0042E31C: GetDC.USER32(00000000), ref: 0042E32B
                                                                                                • Part of subcall function 0042E31C: EnumFontsA.GDI32(?,00000000,0042E308,00000000,00000000,0042E374,?,00000000,00000000,004809BD,?,?,00000001,00000000,00000002,00000000), ref: 0042E356
                                                                                                • Part of subcall function 0042E31C: ReleaseDC.USER32(00000000,?), ref: 0042E36E
                                                                                              • SendNotifyMessageA.USER32(000204A8,00000496,00002711,-00000001), ref: 0047E6BA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: EnumFontsMessageNotifyReleaseSend
                                                                                              • String ID:
                                                                                              • API String ID: 2649214853-0
                                                                                              • Opcode ID: 7f479caed6d506e1fedd37a3e9b8fbc918d7d672324c4412b746d2e8a14c4527
                                                                                              • Instruction ID: a62c935d52da393e7312112ce75ddb0898731394ffd2a16b1d4fc3e518f8127d
                                                                                              • Opcode Fuzzy Hash: 7f479caed6d506e1fedd37a3e9b8fbc918d7d672324c4412b746d2e8a14c4527
                                                                                              • Instruction Fuzzy Hash: 5B5195746001049BC710FF67E98169A37E5EB58308B90C67BA8049B3A6DB3CED45CB9D
                                                                                              APIs
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,0047DF83,?,?,?,?,00000000,00000000,00000000,00000000), ref: 0047DF3D
                                                                                                • Part of subcall function 0042CA00: GetSystemMetrics.USER32(0000002A), ref: 0042CA12
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMetricsMultiSystemWide
                                                                                              • String ID: /G
                                                                                              • API String ID: 224039744-2088674125
                                                                                              • Opcode ID: 9f8ad520ff63b3f089cafa147e7d8bbd1691bb3a433f158030b0d1014876a4d7
                                                                                              • Instruction ID: 84c81a41a939c89cd5cf89585cf0d961f9543ff151f38a86aad590f5673b43e0
                                                                                              • Opcode Fuzzy Hash: 9f8ad520ff63b3f089cafa147e7d8bbd1691bb3a433f158030b0d1014876a4d7
                                                                                              • Instruction Fuzzy Hash: 53518070A04215AFDB21DF55D8C4FAA7BB8EF64318F118077E404AB3A1C778AE45CB99
                                                                                              APIs
                                                                                              • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,0042DFD6,?,?,00000008,00000000,00000000,0042E003), ref: 0042DF6C
                                                                                              • RegCloseKey.ADVAPI32(?,0042DFDD,?,00000000,00000000,00000000,00000000,00000000,0042DFD6,?,?,00000008,00000000,00000000,0042E003), ref: 0042DFD0
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseEnum
                                                                                              • String ID:
                                                                                              • API String ID: 2818636725-0
                                                                                              • Opcode ID: 54e2847b2ed8cbec0c232d6556bf46b22f1e93997a90c035dd6b8310f6c19c74
                                                                                              • Instruction ID: d62689c7b7995b9893119ef97773413105dd68debc8ff02f2d4f9d8a28cc91ff
                                                                                              • Opcode Fuzzy Hash: 54e2847b2ed8cbec0c232d6556bf46b22f1e93997a90c035dd6b8310f6c19c74
                                                                                              • Instruction Fuzzy Hash: DD31B270F04258AEDB11DFA6DD42BAEBBB9EB49304F91407BE501E6280D6785E01CA2D
                                                                                              APIs
                                                                                              • CreateProcessA.KERNEL32(00000000,00000000,?,?,00458278,00000000,00458260,?,?,?,00000000,00452862,?,?,?,00000001), ref: 0045283C
                                                                                              • GetLastError.KERNEL32(00000000,00000000,?,?,00458278,00000000,00458260,?,?,?,00000000,00452862,?,?,?,00000001), ref: 00452844
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateErrorLastProcess
                                                                                              • String ID:
                                                                                              • API String ID: 2919029540-0
                                                                                              • Opcode ID: 32d7980bd8ec2bee900e92c865b72ef71cfaa45d55aa0c85c0401d49ed696f28
                                                                                              • Instruction ID: fcc055d8c1a696a2a0db1e32a085008d871673fec5534948229a16d4440eefa6
                                                                                              • Opcode Fuzzy Hash: 32d7980bd8ec2bee900e92c865b72ef71cfaa45d55aa0c85c0401d49ed696f28
                                                                                              • Instruction Fuzzy Hash: A2113C72600208AF8B40DEA9DD41D9F77ECEB4E310B114567FD18D3241D678EE148B68
                                                                                              APIs
                                                                                              • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040ADF2
                                                                                              • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040AF4F,00000000,0040AF67,?,?,?,00000000), ref: 0040AE03
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Resource$FindFree
                                                                                              • String ID:
                                                                                              • API String ID: 4097029671-0
                                                                                              • Opcode ID: 07387713778517d694c210176a4718dd0562bb365b6db4bb8115bda04798bcb6
                                                                                              • Instruction ID: 3d7a77417cef7b3885e8747e4544195f2de945da78ee84bb1155330bb8f828e3
                                                                                              • Opcode Fuzzy Hash: 07387713778517d694c210176a4718dd0562bb365b6db4bb8115bda04798bcb6
                                                                                              • Instruction Fuzzy Hash: 0301F771300700AFD700FF69EC52E1B77EDDB46714710807AF500AB3D1D639AC10966A
                                                                                              APIs
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 0041EEF3
                                                                                              • EnumThreadWindows.USER32(00000000,0041EE54,00000000), ref: 0041EEF9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Thread$CurrentEnumWindows
                                                                                              • String ID:
                                                                                              • API String ID: 2396873506-0
                                                                                              • Opcode ID: 30aad164e0a195eeb96462141dc827bf49acbc8680001675c00c89b7ac155170
                                                                                              • Instruction ID: bcaa23655132f8f2785c0a842f21b48ac99b37e3223c43442b01e3940dbd0cdf
                                                                                              • Opcode Fuzzy Hash: 30aad164e0a195eeb96462141dc827bf49acbc8680001675c00c89b7ac155170
                                                                                              • Instruction Fuzzy Hash: 31015B76A04604BFD706CF6BEC1199ABBE8E789720B22887BEC04D3690E7355C10DF18
                                                                                              APIs
                                                                                              • MoveFileA.KERNEL32(00000000,00000000), ref: 00452CC2
                                                                                              • GetLastError.KERNEL32(00000000,00000000,00000000,00452CE8), ref: 00452CCA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorFileLastMove
                                                                                              • String ID:
                                                                                              • API String ID: 55378915-0
                                                                                              • Opcode ID: 92f277caa9c3c56662d1ce6f28aaa0531c95695199337b3952b9b7b9e7465d28
                                                                                              • Instruction ID: 1f9035ddd188b097fe3d15476f32cd7793c58c8f4df07880d9fc6ba60e4ff235
                                                                                              • Opcode Fuzzy Hash: 92f277caa9c3c56662d1ce6f28aaa0531c95695199337b3952b9b7b9e7465d28
                                                                                              • Instruction Fuzzy Hash: 9401D671A04208AB8712EB799D4149EB7ECEB8A32575045BBFC04E3243EA785E048558
                                                                                              APIs
                                                                                              • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,004527CF), ref: 004527A9
                                                                                              • GetLastError.KERNEL32(00000000,00000000,00000000,004527CF), ref: 004527B1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateDirectoryErrorLast
                                                                                              • String ID:
                                                                                              • API String ID: 1375471231-0
                                                                                              • Opcode ID: 855e2e178366579e8cdbc9f044a0346376c594dce53ca60ac40061c8de66a150
                                                                                              • Instruction ID: e3b373b60118a844676bb749001e6832c3b26a50706decb61b3ae2e0e224b701
                                                                                              • Opcode Fuzzy Hash: 855e2e178366579e8cdbc9f044a0346376c594dce53ca60ac40061c8de66a150
                                                                                              • Instruction Fuzzy Hash: 40F02871A00308BBCB01EF759D4259EB7E8EB4E311B2045B7FC04E3642E6B94E04859C
                                                                                              APIs
                                                                                              • LoadCursorA.USER32(00000000,00007F00), ref: 00423249
                                                                                              • LoadCursorA.USER32(00000000,00000000), ref: 00423273
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CursorLoad
                                                                                              • String ID:
                                                                                              • API String ID: 3238433803-0
                                                                                              • Opcode ID: 0c9a104e89a33193f60416200903d3bd70bbd31149720632682593485f60625b
                                                                                              • Instruction ID: 5e34cf6406f075c2c63d733b1f02ef4b9a88184ee1572dc0f3c8875cc615d59b
                                                                                              • Opcode Fuzzy Hash: 0c9a104e89a33193f60416200903d3bd70bbd31149720632682593485f60625b
                                                                                              • Instruction Fuzzy Hash: 9EF0A711B04254AADA109E7E6CC0D6B72A8DF82735B61037BFA3EC72D1C62E1D414569
                                                                                              APIs
                                                                                              • SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                                                                                              • LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLibraryLoadMode
                                                                                              • String ID:
                                                                                              • API String ID: 2987862817-0
                                                                                              • Opcode ID: 4bb5710dc3172506f3a82e57bec548632d1945d06b3d92e94bd16d63dfaa8550
                                                                                              • Instruction ID: 14c2566281f292fbf4bc3f3871eddb8f7eb4f11f4d1149329263d7d1c8790498
                                                                                              • Opcode Fuzzy Hash: 4bb5710dc3172506f3a82e57bec548632d1945d06b3d92e94bd16d63dfaa8550
                                                                                              • Instruction Fuzzy Hash: 02F08970B147447FDB119F779CA241BBBECDB49B1175249B6F800A3591E53C4910C928
                                                                                              APIs
                                                                                              • SetFilePointer.KERNEL32(?,00000000,?,00000002,?,?,00470149,?,00000000), ref: 0045090E
                                                                                              • GetLastError.KERNEL32(?,00000000,?,00000002,?,?,00470149,?,00000000), ref: 00450916
                                                                                                • Part of subcall function 004506B4: GetLastError.KERNEL32(004504D0,00450776,?,00000000,?,00497E2C,00000001,00000000,00000002,00000000,00497F8D,?,?,00000005,00000000,00497FC1), ref: 004506B7
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$FilePointer
                                                                                              • String ID:
                                                                                              • API String ID: 1156039329-0
                                                                                              • Opcode ID: ec46a7bc9e5a7a34518fa7989fb6988307d7ef9dfce9dbcd61575ad1106d4b51
                                                                                              • Instruction ID: 32d43412562f4d6ab64aa8be608e77008e370c57458e4df53f7444e76f76d0cb
                                                                                              • Opcode Fuzzy Hash: ec46a7bc9e5a7a34518fa7989fb6988307d7ef9dfce9dbcd61575ad1106d4b51
                                                                                              • Instruction Fuzzy Hash: 0EE012E93042015BF700EA6599C1B2F22DCDB44315F00446ABD44CA28BE678CC048B29
                                                                                              APIs
                                                                                              • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                                                                                              • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Virtual$AllocFree
                                                                                              • String ID:
                                                                                              • API String ID: 2087232378-0
                                                                                              • Opcode ID: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                                                                                              • Instruction ID: 119661fe7174a079321c86e78af40791ac039b5eb8373b45468023a5ba433726
                                                                                              • Opcode Fuzzy Hash: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                                                                                              • Instruction Fuzzy Hash: F7F08272A0063067EB60596A4C81B5359859BC5B94F154076FD09FF3E9D6B58C0142A9
                                                                                              APIs
                                                                                              • GetSystemDefaultLCID.KERNEL32(00000000,00408712), ref: 004085FB
                                                                                                • Part of subcall function 00406DEC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00406E09
                                                                                                • Part of subcall function 00408568: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,00408633,?,00000000,00408712), ref: 00408586
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: DefaultInfoLoadLocaleStringSystem
                                                                                              • String ID:
                                                                                              • API String ID: 1658689577-0
                                                                                              • Opcode ID: 92125e52594e5bc8ee6d97e09480d95589045c4468e862feaba19903f63d3f1d
                                                                                              • Instruction ID: 9026c6f0acc6bf601755118861b832b1e3c4c92574a9a05948c89544872af2a3
                                                                                              • Opcode Fuzzy Hash: 92125e52594e5bc8ee6d97e09480d95589045c4468e862feaba19903f63d3f1d
                                                                                              • Instruction Fuzzy Hash: 47314E35E00109ABCB00EB55CC819EEB779EF84314F558577E815BB286EB38AA018B98
                                                                                              APIs
                                                                                              • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 0041FC39
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: InfoScroll
                                                                                              • String ID:
                                                                                              • API String ID: 629608716-0
                                                                                              • Opcode ID: a0ce2aaa01497ac04468ea6ac7a83421c49688bcbeeff2d3e991700215f3b25f
                                                                                              • Instruction ID: 6365c2cd079840e4170b7c9ce409c3d873e807bce8729d2e10e5c00059922083
                                                                                              • Opcode Fuzzy Hash: a0ce2aaa01497ac04468ea6ac7a83421c49688bcbeeff2d3e991700215f3b25f
                                                                                              • Instruction Fuzzy Hash: D8214FB1608746AFC351DF3984407A6BBE4BB48344F14893EE498C3741E778E99ACBD6
                                                                                              APIs
                                                                                                • Part of subcall function 0041EEA4: GetCurrentThreadId.KERNEL32 ref: 0041EEF3
                                                                                                • Part of subcall function 0041EEA4: EnumThreadWindows.USER32(00000000,0041EE54,00000000), ref: 0041EEF9
                                                                                              • SHPathPrepareForWriteA.SHELL32(00000000,00000000,00000000,00000000,00000000,0046C4AE,?,00000000,?,?,0046C6C0,?,00000000,0046C734), ref: 0046C492
                                                                                                • Part of subcall function 0041EF58: IsWindow.USER32(?), ref: 0041EF66
                                                                                                • Part of subcall function 0041EF58: EnableWindow.USER32(?,00000001), ref: 0041EF75
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ThreadWindow$CurrentEnableEnumPathPrepareWindowsWrite
                                                                                              • String ID:
                                                                                              • API String ID: 3319771486-0
                                                                                              • Opcode ID: 0af19ab3550c8734ef4e1cf2f84aef4c41dad365f35295dd8d2c2646a272cfa9
                                                                                              • Instruction ID: eef1953176fed27c4f60a3b97998f4e8fb1447464a393d6256780c84e8a913cd
                                                                                              • Opcode Fuzzy Hash: 0af19ab3550c8734ef4e1cf2f84aef4c41dad365f35295dd8d2c2646a272cfa9
                                                                                              • Instruction Fuzzy Hash: 5AF0B471248300BFE705DF62ECA6B35B6E8D748714F61047BF40886590E97D5844D51E
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileWrite
                                                                                              • String ID:
                                                                                              • API String ID: 3934441357-0
                                                                                              • Opcode ID: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                                              • Instruction ID: 51b66c86ab1fb2ed9abdb0db83839a26410808368eb32e0cb4295e2ee82716ff
                                                                                              • Opcode Fuzzy Hash: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                                              • Instruction Fuzzy Hash: 09F04970608109EBBB1CCF58D0618AF7BA0EB48300F2080AFE907C7BA0D634AA80D658
                                                                                              APIs
                                                                                              • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,00000000,00400000,?), ref: 00416585
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateWindow
                                                                                              • String ID:
                                                                                              • API String ID: 716092398-0
                                                                                              • Opcode ID: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                                                                                              • Instruction ID: 158b8484bb218b41c698b3aa21f26e2dd86497bc01e640ef524e7c8f4c0ee3c6
                                                                                              • Opcode Fuzzy Hash: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                                                                                              • Instruction Fuzzy Hash: 4BF019B2200510AFDB84DE9CD9C0F9773ECEB0C210B0481A6FA08CB21AD220EC108BB0
                                                                                              APIs
                                                                                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004149EF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CallbackDispatcherUser
                                                                                              • String ID:
                                                                                              • API String ID: 2492992576-0
                                                                                              • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                                              • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
                                                                                              • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                                              • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
                                                                                              APIs
                                                                                              • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00450804
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFile
                                                                                              • String ID:
                                                                                              • API String ID: 823142352-0
                                                                                              • Opcode ID: ce99838f7be0491c6923214398908b2fd93372403a84c7b432a549debe4dc153
                                                                                              • Instruction ID: 52eb814c7c241dc182afdc6c3e242d4e4c9a4e6d94000e289351c80ae23ff87c
                                                                                              • Opcode Fuzzy Hash: ce99838f7be0491c6923214398908b2fd93372403a84c7b432a549debe4dc153
                                                                                              • Instruction Fuzzy Hash: 53E012B53541483EE780EEAD6C42F9777DC971A714F008037B998D7341D461DD158BA8
                                                                                              APIs
                                                                                              • GetFileAttributesA.KERNEL32(00000000,00000000,0042CD14,?,00000001,?,?,00000000,?,0042CD66,00000000,00452A25,00000000,00452A46,?,00000000), ref: 0042CCF7
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AttributesFile
                                                                                              • String ID:
                                                                                              • API String ID: 3188754299-0
                                                                                              • Opcode ID: 2e3447488e8940f063bbcfc4a9008e9bc81ad59ac090e4e62a8f5aa92ecca264
                                                                                              • Instruction ID: d3c11148bbbe1678040d416a6bc301cfea82702c80b798926358c5e84281cc0e
                                                                                              • Opcode Fuzzy Hash: 2e3447488e8940f063bbcfc4a9008e9bc81ad59ac090e4e62a8f5aa92ecca264
                                                                                              • Instruction Fuzzy Hash: 80E065B1304304BFD701EB66EC92A5EBAACDB49754BA14876B50097592D5B86E008468
                                                                                              APIs
                                                                                              • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453273,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8E7
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: FormatMessage
                                                                                              • String ID:
                                                                                              • API String ID: 1306739567-0
                                                                                              • Opcode ID: 07eb917982e44065cc90d67cadef310e262c4caec6bcfbb1197f6d5f5d2cfc19
                                                                                              • Instruction ID: fbc307da5c1359fbfbc351051067b699ae1438aedf6613c80dda169529e76e7e
                                                                                              • Opcode Fuzzy Hash: 07eb917982e44065cc90d67cadef310e262c4caec6bcfbb1197f6d5f5d2cfc19
                                                                                              • Instruction Fuzzy Hash: BCE0206278431116F2353416AC47B77150E43C0708F944027BB90DF3D3D6AF9945D25E
                                                                                              APIs
                                                                                              • GetTextExtentPointA.GDI32(?,00000000,00000000), ref: 0041AF9B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExtentPointText
                                                                                              • String ID:
                                                                                              • API String ID: 566491939-0
                                                                                              • Opcode ID: fe3873e992a20e622ffaf78f93863b288a9be0a8311253c2d6346deae250c6a6
                                                                                              • Instruction ID: 6b43be1268843882f9474f888990ee0a0f71ddbfb678ee1088bae751a0726d8f
                                                                                              • Opcode Fuzzy Hash: fe3873e992a20e622ffaf78f93863b288a9be0a8311253c2d6346deae250c6a6
                                                                                              • Instruction Fuzzy Hash: E3E086F13097102BD600E67E1DC19DB77DC8A483697148177F458E7392D62DDE1A43AE
                                                                                              APIs
                                                                                              • CreateWindowExA.USER32(00000000,0042367C,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00406311
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateWindow
                                                                                              • String ID:
                                                                                              • API String ID: 716092398-0
                                                                                              • Opcode ID: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                                              • Instruction ID: 53e57476791a39574122dfc8a3f58f2f78c4a621b5a82e38d1c80b15216a1e52
                                                                                              • Opcode Fuzzy Hash: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                                              • Instruction Fuzzy Hash: EEE0FEB2214209BBDB00DE8ADCC1DABB7ACFB4C654F808105BB1C972428275AC608B71
                                                                                              APIs
                                                                                              • RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE10
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Create
                                                                                              • String ID:
                                                                                              • API String ID: 2289755597-0
                                                                                              • Opcode ID: 296f4a6b1841180fcb6525c1425398a2afe0618770c3240f8adf4a5c8222c494
                                                                                              • Instruction ID: 68673b5cf84413dff1d7ecec16939cb2303f89f305828e6cd22260af4b89741b
                                                                                              • Opcode Fuzzy Hash: 296f4a6b1841180fcb6525c1425398a2afe0618770c3240f8adf4a5c8222c494
                                                                                              • Instruction Fuzzy Hash: EDE07EB2610119AF9B40DE8CDC81EEB37ADAB1D350F404016FA08E7200C2B4EC519BB4
                                                                                              APIs
                                                                                              • FindClose.KERNEL32(00000000,000000FF,0047096C,00000000,00471782,?,00000000,004717CB,?,00000000,00471904,?,00000000,?,00000000), ref: 00454C0E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseFind
                                                                                              • String ID:
                                                                                              • API String ID: 1863332320-0
                                                                                              • Opcode ID: 6665614e34a0f7cff573ca1669b2a109aa27f3c0ddffd1931b228eca5c2d9aab
                                                                                              • Instruction ID: 5c2dbd3a099336849a47a332199978da45cb785deb8a29a76394180ab3bc5383
                                                                                              • Opcode Fuzzy Hash: 6665614e34a0f7cff573ca1669b2a109aa27f3c0ddffd1931b228eca5c2d9aab
                                                                                              • Instruction Fuzzy Hash: A1E09BB09097004BC715DF39858031A76D19FC9325F05C96AEC99CF3D7E77D84454617
                                                                                              APIs
                                                                                              • KiUserCallbackDispatcher.NTDLL(004959E6,?,00495A08,?,?,00000000,004959E6,?,?), ref: 0041469B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CallbackDispatcherUser
                                                                                              • String ID:
                                                                                              • API String ID: 2492992576-0
                                                                                              • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                                              • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
                                                                                              • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                                              • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
                                                                                              APIs
                                                                                              • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00406F24
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileWrite
                                                                                              • String ID:
                                                                                              • API String ID: 3934441357-0
                                                                                              • Opcode ID: 4c02731fe18b0a47ab7745946c5e8dd4c7dfafdb2aa22804bebcbb41d9412fbb
                                                                                              • Instruction ID: adeaf4ebd0e6cd94d64be6b3cb299443ba394f13a0b1cd3d8337db6b6af80796
                                                                                              • Opcode Fuzzy Hash: 4c02731fe18b0a47ab7745946c5e8dd4c7dfafdb2aa22804bebcbb41d9412fbb
                                                                                              • Instruction Fuzzy Hash: 53D012722091506AD220965A6C44EAB6BDCCBC5770F11063AB558C2181D7209C01C675
                                                                                              APIs
                                                                                                • Part of subcall function 004235F8: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 0042360D
                                                                                              • ShowWindow.USER32(00410460,00000009,?,00000000,0041EDA4,0042393A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00423667
                                                                                                • Part of subcall function 00423628: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 00423644
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: InfoParametersSystem$ShowWindow
                                                                                              • String ID:
                                                                                              • API String ID: 3202724764-0
                                                                                              • Opcode ID: 749b279e1c5e0ab7b3e77853442b745bf30ea7cb0c28c018a636783dda1148f2
                                                                                              • Instruction ID: 3e39ddd90fb628193caaea160b6f4ed5bf244f394cc2da11a07db6b12dca8b82
                                                                                              • Opcode Fuzzy Hash: 749b279e1c5e0ab7b3e77853442b745bf30ea7cb0c28c018a636783dda1148f2
                                                                                              • Instruction Fuzzy Hash: 34D05E123821703142307ABB280699B46EC8D822EB389043BB5449B312ED5DCE01116C
                                                                                              APIs
                                                                                              • SetWindowTextA.USER32(?,00000000), ref: 004242DC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: TextWindow
                                                                                              • String ID:
                                                                                              • API String ID: 530164218-0
                                                                                              • Opcode ID: 968e2600307bd84f4d65718215a4df57ccfa9b7919b98356d7a542cd4e907fd2
                                                                                              • Instruction ID: e359d8c046b4275bb87a72ac3440150ee0889cd0e7de0465f76ccf46c1161c2e
                                                                                              • Opcode Fuzzy Hash: 968e2600307bd84f4d65718215a4df57ccfa9b7919b98356d7a542cd4e907fd2
                                                                                              • Instruction Fuzzy Hash: 81D05EE27011602BCB01BAED54C4AC667CC9B8D25AB1840BBF904EF257D638CE40C398
                                                                                              APIs
                                                                                              • KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467828,00000000,00000000,00000000,0000000C,00000000), ref: 00466B58
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CallbackDispatcherUser
                                                                                              • String ID:
                                                                                              • API String ID: 2492992576-0
                                                                                              • Opcode ID: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                                              • Instruction ID: a3a9c25b9c80179eca176ae0059a0aa24e3542550d9dc9bac8dced773014ab2a
                                                                                              • Opcode Fuzzy Hash: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                                              • Instruction Fuzzy Hash: 0ED09272210A109F8364CAADC9C4C97B3ECEF4C2213004659E54AC3B15D664FC018BA0
                                                                                              APIs
                                                                                              • GetFileAttributesA.KERNEL32(00000000,00000000,004515CB,00000000), ref: 0042CD2F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AttributesFile
                                                                                              • String ID:
                                                                                              • API String ID: 3188754299-0
                                                                                              • Opcode ID: 699a035a793c66476b33cfcb292e18e8433149420fa0246697406cd7a61acf8b
                                                                                              • Instruction ID: 53db4a1afaa3b7bebcc80daf879f764776582c58df104e6651e2d127eece83ed
                                                                                              • Opcode Fuzzy Hash: 699a035a793c66476b33cfcb292e18e8433149420fa0246697406cd7a61acf8b
                                                                                              • Instruction Fuzzy Hash: 48C08CE03222001A9E60A6BD2CC551F06CC891423A3A41E3BB129EB2E2D23D88162818
                                                                                              APIs
                                                                                              • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040A6D4,0040CC80,?,00000000,?), ref: 00406EDD
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFile
                                                                                              • String ID:
                                                                                              • API String ID: 823142352-0
                                                                                              • Opcode ID: d487f09bce5ab2446fefe52ff91139140134d323c8d44495a9ab4cbc0f9c4527
                                                                                              • Instruction ID: fbce42704b7dd2fd8be74a622cf743b4adaa06f64be9adac3ea2875d17ee2119
                                                                                              • Opcode Fuzzy Hash: d487f09bce5ab2446fefe52ff91139140134d323c8d44495a9ab4cbc0f9c4527
                                                                                              • Instruction Fuzzy Hash: EAC048A13C130032F92035A60C87F16008C5754F0AE60C43AB740BF1C2D8E9A818022C
                                                                                              APIs
                                                                                              • SetEndOfFile.KERNEL32(?,?,0045C342,00000000,0045C4CD,?,00000000,00000002,00000002), ref: 00450933
                                                                                                • Part of subcall function 004506B4: GetLastError.KERNEL32(004504D0,00450776,?,00000000,?,00497E2C,00000001,00000000,00000002,00000000,00497F8D,?,?,00000005,00000000,00497FC1), ref: 004506B7
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorFileLast
                                                                                              • String ID:
                                                                                              • API String ID: 734332943-0
                                                                                              • Opcode ID: dfd6122944db5b319254e7b77af95d7469dcf5406d44b15aeae4525e96e42585
                                                                                              • Instruction ID: 9573b676cf6dd5fef234c73c81a1a5d02d78d5ca05287b50762f3c98dcfac2da
                                                                                              • Opcode Fuzzy Hash: dfd6122944db5b319254e7b77af95d7469dcf5406d44b15aeae4525e96e42585
                                                                                              • Instruction Fuzzy Hash: 1AC04CA5700211479F10A6BA85C1A0662D86A5D3157144066BD08CF207D668D8148A18
                                                                                              APIs
                                                                                              • SetCurrentDirectoryA.KERNEL32(00000000,?,00497DBA,00000000,00497F8D,?,?,00000005,00000000,00497FC1,?,?,00000000), ref: 004072B3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CurrentDirectory
                                                                                              • String ID:
                                                                                              • API String ID: 1611563598-0
                                                                                              • Opcode ID: 9cfe1b671e2ded52e2a4f1899edd371c25323ab6eac1b77aed394817f5a1d109
                                                                                              • Instruction ID: 2ee9fcf0c2ecb8048618371478a38130c752a95b947e2a8aefd026f579ab26ad
                                                                                              • Opcode Fuzzy Hash: 9cfe1b671e2ded52e2a4f1899edd371c25323ab6eac1b77aed394817f5a1d109
                                                                                              • Instruction Fuzzy Hash: 33B012E03D120A2BCA0079FE4CC192A00CC46292163401B3B3006EB1C3D83DC8180824
                                                                                              APIs
                                                                                              • SetErrorMode.KERNEL32(?,0042E40D), ref: 0042E400
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorMode
                                                                                              • String ID:
                                                                                              • API String ID: 2340568224-0
                                                                                              • Opcode ID: cb8e2ebd86b0ac1182f6c4657d989dfa6a466ad308997f4b3834ff3b1e7758f7
                                                                                              • Instruction ID: 426ac138898b17598b25982f2c454791bd479401c65f9a69ae9baa170422678e
                                                                                              • Opcode Fuzzy Hash: cb8e2ebd86b0ac1182f6c4657d989dfa6a466ad308997f4b3834ff3b1e7758f7
                                                                                              • Instruction Fuzzy Hash: CDB09B7670C6105EE709D6D5B45552D63D4D7C57207E14477F010D2581D57D58054E18
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: DestroyWindow
                                                                                              • String ID:
                                                                                              • API String ID: 3375834691-0
                                                                                              • Opcode ID: 1244af60e57b01067fe56da529b9c4312cbd500fa9ed17bad69dff1823a021af
                                                                                              • Instruction ID: 4f6e5339ba6c71e81ef5aec1f6829bfe42d3c8de95bc03762545e97b2cddf6f9
                                                                                              • Opcode Fuzzy Hash: 1244af60e57b01067fe56da529b9c4312cbd500fa9ed17bad69dff1823a021af
                                                                                              • Instruction Fuzzy Hash: 1AA00275501500AADA00E7B5D849F7E2298BB44204FD905F9714897056C57C99008B55
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 2f87504b9b3c5ef8a424e08888e9b878f09f15df180bfdf00abd21092ab1bc52
                                                                                              • Instruction ID: 41a6872630840156d23f43a697f0b10540748f54e9aa1b8241e7bbe25a2b1888
                                                                                              • Opcode Fuzzy Hash: 2f87504b9b3c5ef8a424e08888e9b878f09f15df180bfdf00abd21092ab1bc52
                                                                                              • Instruction Fuzzy Hash: 73517574E002099FDB00EFA9C892AAFBBF5EB49314F50817AE500E7351DB389D41CB98
                                                                                              APIs
                                                                                              • VirtualAlloc.KERNEL32(?,?,00001000,00000004), ref: 004016E5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocVirtual
                                                                                              • String ID:
                                                                                              • API String ID: 4275171209-0
                                                                                              • Opcode ID: 47d193b6e2a7cd5d08654666eaa389c617a6dede1e25b429ba4b9347f0204c7a
                                                                                              • Instruction ID: 6a16e23f067707d24f18c42e6f5d2b80673e03c7ad610ea939709aa0270b7034
                                                                                              • Opcode Fuzzy Hash: 47d193b6e2a7cd5d08654666eaa389c617a6dede1e25b429ba4b9347f0204c7a
                                                                                              • Instruction Fuzzy Hash: 7E11C272A057059FC3108F19CC80A2BB7E5EFC4764F09C93DE598673A5D735AC409789
                                                                                              APIs
                                                                                              • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDA4,?,0042388F,00423C0C,0041EDA4), ref: 0041F3E2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocVirtual
                                                                                              • String ID:
                                                                                              • API String ID: 4275171209-0
                                                                                              • Opcode ID: f624f178b2757757f6ee0ed82108e7e17b49aa81eb1cfd09d0e3ddd3732ee692
                                                                                              • Instruction ID: 3312bc658de40493dbbbdb628fa1ac862c14c743cb2aabe02eeb7d71ec829e14
                                                                                              • Opcode Fuzzy Hash: f624f178b2757757f6ee0ed82108e7e17b49aa81eb1cfd09d0e3ddd3732ee692
                                                                                              • Instruction Fuzzy Hash: D5115A752007059BCB20DF19D880B82FBE5EF98390F10C53BE9688B385D3B4E8458BA9
                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(00000000,0045302D), ref: 0045300F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast
                                                                                              • String ID:
                                                                                              • API String ID: 1452528299-0
                                                                                              • Opcode ID: 796ee09302341f2f0fe022b6b7ad64e2259239b3e6510a293da86372227c0e6a
                                                                                              • Instruction ID: b902f5f71593d0acd8113edc39c0d5725662cc955bae9521e0e34912f41e4d76
                                                                                              • Opcode Fuzzy Hash: 796ee09302341f2f0fe022b6b7ad64e2259239b3e6510a293da86372227c0e6a
                                                                                              • Instruction Fuzzy Hash: 850170356042486FC701DF699C008EEFBE8EB4D76171082B7FC24C3382D7345E059664
                                                                                              APIs
                                                                                              • VirtualFree.KERNEL32(?,?,00004000,?,?,?,?,?,00401973), ref: 00401766
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeVirtual
                                                                                              • String ID:
                                                                                              • API String ID: 1263568516-0
                                                                                              • Opcode ID: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                                                                                              • Instruction ID: fd45504e6079eb3c344fd15592bdf3984e08e9418c18d248e8b2091ea2ac4f2a
                                                                                              • Opcode Fuzzy Hash: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                                                                                              • Instruction Fuzzy Hash: A10120766443148FC3109F29EDC0E2677E8D794378F15453EDA85673A1D37A6C0187D8
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseHandle
                                                                                              • String ID:
                                                                                              • API String ID: 2962429428-0
                                                                                              • Opcode ID: 11f5b55454e2001d57305e4d26194660ee260494afc1ae4151642f59c6b90a28
                                                                                              • Instruction ID: 073c3129693101c5e7833b7ffa09eca8aa7a1e81ff9bb2ce6bcaaab03392c7d4
                                                                                              • Opcode Fuzzy Hash: 11f5b55454e2001d57305e4d26194660ee260494afc1ae4151642f59c6b90a28
                                                                                              • Instruction Fuzzy Hash:
                                                                                              APIs
                                                                                              • GetVersion.KERNEL32(?,00418FF0,00000000,?,?,?,00000001), ref: 0041F126
                                                                                              • SetErrorMode.KERNEL32(00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F142
                                                                                              • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F14E
                                                                                              • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F15C
                                                                                              • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F18C
                                                                                              • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1B5
                                                                                              • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1CA
                                                                                              • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1DF
                                                                                              • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F1F4
                                                                                              • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F209
                                                                                              • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F21E
                                                                                              • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F233
                                                                                              • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F248
                                                                                              • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F25D
                                                                                              • FreeLibrary.KERNEL32(00000001,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F26F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
                                                                                              • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                                                                                              • API String ID: 2323315520-3614243559
                                                                                              • Opcode ID: 62814c6def9f01bce39a36d2c4270fbdb1234b3c2cb706e68bb71ccad2797809
                                                                                              • Instruction ID: e724c2aa341d6685c6ab1c4031cb88844a897dd828fe35f3324890dc483947ec
                                                                                              • Opcode Fuzzy Hash: 62814c6def9f01bce39a36d2c4270fbdb1234b3c2cb706e68bb71ccad2797809
                                                                                              • Instruction Fuzzy Hash: 8E314FB2640700ABEB01EBB9AC46A6B3794F328724741093FB508D7192D77C5C55CF5C
                                                                                              APIs
                                                                                              • GetTickCount.KERNEL32 ref: 0045862F
                                                                                              • QueryPerformanceCounter.KERNEL32(021F3858,00000000,004588C2,?,?,021F3858,00000000,?,00458FBE,?,021F3858,00000000), ref: 00458638
                                                                                              • GetSystemTimeAsFileTime.KERNEL32(021F3858,021F3858), ref: 00458642
                                                                                              • GetCurrentProcessId.KERNEL32(?,021F3858,00000000,004588C2,?,?,021F3858,00000000,?,00458FBE,?,021F3858,00000000), ref: 0045864B
                                                                                              • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 004586C1
                                                                                              • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,021F3858,021F3858), ref: 004586CF
                                                                                              • CreateFileA.KERNEL32(00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,0045887E), ref: 00458717
                                                                                              • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,0045886D,?,00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,0045887E), ref: 00458750
                                                                                                • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                                                              • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 004587F9
                                                                                              • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 0045882F
                                                                                              • CloseHandle.KERNEL32(000000FF,00458874,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00458867
                                                                                                • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateHandle$CloseErrorFileLastNamedPipeProcessSystemTime$CountCounterCurrentDirectoryPerformanceQueryStateTick
                                                                                              • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$helper %d 0x%x$i
                                                                                              • API String ID: 770386003-3271284199
                                                                                              • Opcode ID: a79b95222fdd7f93703faf8b41e336e667bfcfce42d59c7d41cb43afe138310a
                                                                                              • Instruction ID: 54c9584e853abf465b9d0f30fdd509929e5717807e8393d963d4681616065440
                                                                                              • Opcode Fuzzy Hash: a79b95222fdd7f93703faf8b41e336e667bfcfce42d59c7d41cb43afe138310a
                                                                                              • Instruction Fuzzy Hash: 19710470A003449EDB11EB65CC45B9E77F4EB05705F1085BAF904FB282DB7899488F69
                                                                                              APIs
                                                                                                • Part of subcall function 00478370: GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,021F2BD8,?,?,?,021F2BD8,00478534,00000000,00478652,?,?,-00000010,?), ref: 00478389
                                                                                                • Part of subcall function 00478370: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0047838F
                                                                                                • Part of subcall function 00478370: GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,021F2BD8,?,?,?,021F2BD8,00478534,00000000,00478652,?,?,-00000010,?), ref: 004783A2
                                                                                                • Part of subcall function 00478370: CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,021F2BD8,?,?,?,021F2BD8), ref: 004783CC
                                                                                                • Part of subcall function 00478370: CloseHandle.KERNEL32(00000000,?,?,?,021F2BD8,00478534,00000000,00478652,?,?,-00000010,?), ref: 004783EA
                                                                                                • Part of subcall function 00478448: GetCurrentDirectoryA.KERNEL32(00000104,?,00000000,004784DA,?,?,?,021F2BD8,?,0047853C,00000000,00478652,?,?,-00000010,?), ref: 00478478
                                                                                              • ShellExecuteEx.SHELL32(0000003C), ref: 0047858C
                                                                                              • GetLastError.KERNEL32(00000000,00478652,?,?,-00000010,?), ref: 00478595
                                                                                              • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 004785E2
                                                                                              • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 00478606
                                                                                              • CloseHandle.KERNEL32(00000000,00478637,00000000,00000000,000000FF,000000FF,00000000,00478630,?,00000000,00478652,?,?,-00000010,?), ref: 0047862A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Handle$CloseFile$AddressAttributesCodeCreateCurrentDirectoryErrorExecuteExitLastModuleMultipleObjectsProcProcessShellWait
                                                                                              • String ID: <$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
                                                                                              • API String ID: 883996979-221126205
                                                                                              • Opcode ID: e395260aa41f9ccfe4acc1b6a7661f4649f54ca3d6eb9a5996b4c5021f667ff4
                                                                                              • Instruction ID: b05a94d88e1d9ee0fbafe330a65326fe691daae9ca7e583bddfe233bc85c86e1
                                                                                              • Opcode Fuzzy Hash: e395260aa41f9ccfe4acc1b6a7661f4649f54ca3d6eb9a5996b4c5021f667ff4
                                                                                              • Instruction Fuzzy Hash: 0E314470A40208BEDB11EFE6C859ADEB7B8EB45718F50843FF508E7281DA7C99058B5D
                                                                                              APIs
                                                                                              • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 004229F4
                                                                                              • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,00422BBE), ref: 00422A04
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSendShowWindow
                                                                                              • String ID:
                                                                                              • API String ID: 1631623395-0
                                                                                              • Opcode ID: 7d35c436bdc301b114185cd71e9b34d3d25d314c488a7ae3a8b4f853deae8013
                                                                                              • Instruction ID: 9e9026b6a08d43f4c34b0c014f83afec13b9727198b5f0eb67f7172f0d04fbcb
                                                                                              • Opcode Fuzzy Hash: 7d35c436bdc301b114185cd71e9b34d3d25d314c488a7ae3a8b4f853deae8013
                                                                                              • Instruction Fuzzy Hash: 90915171B04214BFDB11EFA9DA86F9D77F4AB04304F5500BAF504AB392CB78AE419B58
                                                                                              APIs
                                                                                              • IsIconic.USER32(?), ref: 00418393
                                                                                              • GetWindowPlacement.USER32(?,0000002C), ref: 004183B0
                                                                                              • GetWindowRect.USER32(?), ref: 004183CC
                                                                                              • GetWindowLongA.USER32(?,000000F0), ref: 004183DA
                                                                                              • GetWindowLongA.USER32(?,000000F8), ref: 004183EF
                                                                                              • ScreenToClient.USER32(00000000), ref: 004183F8
                                                                                              • ScreenToClient.USER32(00000000,?), ref: 00418403
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$ClientLongScreen$IconicPlacementRect
                                                                                              • String ID: ,
                                                                                              • API String ID: 2266315723-3772416878
                                                                                              • Opcode ID: 093fbc58c9f2bb22a74bd7cb36b3f86111f4d6c014dbe9a16a5ffda61369e0f0
                                                                                              • Instruction ID: 8875a2d430ef8be2c5346fa25315cde737655516302bc4d2344e38a88124d083
                                                                                              • Opcode Fuzzy Hash: 093fbc58c9f2bb22a74bd7cb36b3f86111f4d6c014dbe9a16a5ffda61369e0f0
                                                                                              • Instruction Fuzzy Hash: 2B112B71505201ABEB00DF69C885F9B77E8AF48314F04067EFD58DB296D738D900CB65
                                                                                              APIs
                                                                                              • GetCurrentProcess.KERNEL32(00000028), ref: 004555F3
                                                                                              • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004555F9
                                                                                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00455612
                                                                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 00455639
                                                                                              • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 0045563E
                                                                                              • ExitWindowsEx.USER32(00000002,00000000), ref: 0045564F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                                              • String ID: SeShutdownPrivilege
                                                                                              • API String ID: 107509674-3733053543
                                                                                              • Opcode ID: e41b2ce6836bec360355d7b24c2a1717b910cfd1a437749fc580c6f152555136
                                                                                              • Instruction ID: 23182b732e3c774e917f784577cc733395bd6f0e504c2650860deaf78f25ff04
                                                                                              • Opcode Fuzzy Hash: e41b2ce6836bec360355d7b24c2a1717b910cfd1a437749fc580c6f152555136
                                                                                              • Instruction Fuzzy Hash: CBF0C870294B41B9EA10A6718C17F3B21C89B40709F80083ABD05E90D3D7BDD40C4A2E
                                                                                              APIs
                                                                                              • GetProcAddress.KERNEL32(10000000,ISCryptGetVersion), ref: 0045D191
                                                                                              • GetProcAddress.KERNEL32(10000000,ArcFourInit), ref: 0045D1A1
                                                                                              • GetProcAddress.KERNEL32(10000000,ArcFourCrypt), ref: 0045D1B1
                                                                                              • ISCryptGetVersion._ISCRYPT(10000000,ArcFourCrypt,10000000,ArcFourInit,10000000,ISCryptGetVersion,?,0047F96F,00000000,0047F998), ref: 0045D1D6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$CryptVersion
                                                                                              • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                                                                                              • API String ID: 1951258720-508647305
                                                                                              • Opcode ID: dc81785b55ac876962535e0a2eb36b1dd730d24c9132c457d47d12d4ae2e21c2
                                                                                              • Instruction ID: d394b6b565b4a55a8c16e24b867b534ad65140704dc94b035c924c7661ebf9a3
                                                                                              • Opcode Fuzzy Hash: dc81785b55ac876962535e0a2eb36b1dd730d24c9132c457d47d12d4ae2e21c2
                                                                                              • Instruction Fuzzy Hash: A2F030B0D41700CAD318EFF6AC957263B96EB9830AF14C03BA414C51A2D7794454DF2C
                                                                                              APIs
                                                                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,004981E2,?,?,00000000,0049B628,?,0049836C,00000000,004983C0,?,?,00000000,0049B628), ref: 004980FB
                                                                                              • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 0049817E
                                                                                              • FindNextFileA.KERNEL32(000000FF,?,00000000,004981BA,?,00000000,?,00000000,004981E2,?,?,00000000,0049B628,?,0049836C,00000000), ref: 00498196
                                                                                              • FindClose.KERNEL32(000000FF,004981C1,004981BA,?,00000000,?,00000000,004981E2,?,?,00000000,0049B628,?,0049836C,00000000,004983C0), ref: 004981B4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileFind$AttributesCloseFirstNext
                                                                                              • String ID: isRS-$isRS-???.tmp
                                                                                              • API String ID: 134685335-3422211394
                                                                                              • Opcode ID: 4cf053d52b7de9e99314ef9443aa0be7ff49bfb1b7c6e14e5d4b85c56af708b1
                                                                                              • Instruction ID: fc6fb5a4e2302b333323d0d019d05182e8323e6fc1a1653111c694b95695a562
                                                                                              • Opcode Fuzzy Hash: 4cf053d52b7de9e99314ef9443aa0be7ff49bfb1b7c6e14e5d4b85c56af708b1
                                                                                              • Instruction Fuzzy Hash: E1316A719016186FCF10EF69CC42ADEBBBCDB45314F5044BBA808E3291DA3C9F458E58
                                                                                              APIs
                                                                                              • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457611
                                                                                              • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457638
                                                                                              • SetForegroundWindow.USER32(?), ref: 00457649
                                                                                              • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,00457921,?,00000000,0045795D), ref: 0045790C
                                                                                              Strings
                                                                                              • Cannot evaluate variable because [Code] isn't running yet, xrefs: 0045778C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessagePostWindow$ForegroundNtdllProc_
                                                                                              • String ID: Cannot evaluate variable because [Code] isn't running yet
                                                                                              • API String ID: 2236967946-3182603685
                                                                                              • Opcode ID: 74e42c9c2b67fd5adc195c0662b506aaf6a0f02139eddaf5114ff9c1448628c8
                                                                                              • Instruction ID: 8776962154e21e4b1c8854f5ca4bcfaa90dd950cda3ad59ac2e2fede597431d6
                                                                                              • Opcode Fuzzy Hash: 74e42c9c2b67fd5adc195c0662b506aaf6a0f02139eddaf5114ff9c1448628c8
                                                                                              • Instruction Fuzzy Hash: 2B91D334608204DFEB15CF55E991F5ABBF5EB89704F2184BAE80497792C638AE04DB68
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,00455F4B), ref: 00455E3C
                                                                                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00455E42
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressHandleModuleProc
                                                                                              • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                                                              • API String ID: 1646373207-3712701948
                                                                                              • Opcode ID: 409835b603e199d4170178d82c1615a1651ba94ec2cafac24c158ef3a131e909
                                                                                              • Instruction ID: d81c9a8c7c52065d28d66f53e81ce4f313aa74f068c2efe820cb9bfc493487ae
                                                                                              • Opcode Fuzzy Hash: 409835b603e199d4170178d82c1615a1651ba94ec2cafac24c158ef3a131e909
                                                                                              • Instruction Fuzzy Hash: B0418671A04649AFCF01EFA5C8929EEB7B8EF48305F504567F804F7292D67C5E098B68
                                                                                              APIs
                                                                                              • IsIconic.USER32(?), ref: 00417D0F
                                                                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D2D
                                                                                              • GetWindowPlacement.USER32(?,0000002C), ref: 00417D63
                                                                                              • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D8A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Placement$Iconic
                                                                                              • String ID: ,
                                                                                              • API String ID: 568898626-3772416878
                                                                                              • Opcode ID: b31359e3e3f4af84bc1879df8bb30ee95a40fb82c66b770674b351632ff57231
                                                                                              • Instruction ID: e85585575f8c5a3e7823c55acc6b28d6d187d41511fbfc80546af44b70413e2d
                                                                                              • Opcode Fuzzy Hash: b31359e3e3f4af84bc1879df8bb30ee95a40fb82c66b770674b351632ff57231
                                                                                              • Instruction Fuzzy Hash: 4C2112716042089BDF10EF69D8C1AEA77B8AF48314F05456AFD18DF346D678DD84CBA8
                                                                                              APIs
                                                                                              • SetErrorMode.KERNEL32(00000001,00000000,0046433F), ref: 004641CD
                                                                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,0046430A,?,00000001,00000000,0046433F), ref: 00464213
                                                                                              • FindNextFileA.KERNEL32(000000FF,?,00000000,004642EC,?,00000000,?,00000000,0046430A,?,00000001,00000000,0046433F), ref: 004642C8
                                                                                              • FindClose.KERNEL32(000000FF,004642F3,004642EC,?,00000000,?,00000000,0046430A,?,00000001,00000000,0046433F), ref: 004642E6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Find$File$CloseErrorFirstModeNext
                                                                                              • String ID:
                                                                                              • API String ID: 4011626565-0
                                                                                              • Opcode ID: 1efd1e5842b6513eb7f92915edfbe8fc84401e145746a4d83abe9154eb57289a
                                                                                              • Instruction ID: 9d9184480f8630aada0b530c6bd54f2fc26159d28d851f3c8c43bf9f92f270d6
                                                                                              • Opcode Fuzzy Hash: 1efd1e5842b6513eb7f92915edfbe8fc84401e145746a4d83abe9154eb57289a
                                                                                              • Instruction Fuzzy Hash: 77418370A00A18DBCF10EFA5DC959DEB7B8EB88305F5044AAF804A7341E7789E448E59
                                                                                              APIs
                                                                                              • SetErrorMode.KERNEL32(00000001,00000000,00463E99), ref: 00463D0D
                                                                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,00463E6C,?,00000001,00000000,00463E99), ref: 00463D9C
                                                                                              • FindNextFileA.KERNEL32(000000FF,?,00000000,00463E4E,?,00000000,?,00000000,00463E6C,?,00000001,00000000,00463E99), ref: 00463E2E
                                                                                              • FindClose.KERNEL32(000000FF,00463E55,00463E4E,?,00000000,?,00000000,00463E6C,?,00000001,00000000,00463E99), ref: 00463E48
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Find$File$CloseErrorFirstModeNext
                                                                                              • String ID:
                                                                                              • API String ID: 4011626565-0
                                                                                              • Opcode ID: 7f0cfbd2c28eb096c2c7b79ad6d01cc7699265dce8ba217153498c446e9855ae
                                                                                              • Instruction ID: 85e7d80bc36d7b3e80fea797042c039a90a2821ca6a16b1e557570abf42aa49f
                                                                                              • Opcode Fuzzy Hash: 7f0cfbd2c28eb096c2c7b79ad6d01cc7699265dce8ba217153498c446e9855ae
                                                                                              • Instruction Fuzzy Hash: 3A41B770A00A589FCB11EF65CC45ADEB7B8EB88705F4044BAF404A7381E67D9F48CE59
                                                                                              APIs
                                                                                              • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E956
                                                                                              • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042E981
                                                                                              • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E98E
                                                                                              • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E996
                                                                                              • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E99C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
                                                                                              • String ID:
                                                                                              • API String ID: 1177325624-0
                                                                                              • Opcode ID: 00c40fca2cfdd97ba02e44e9efda7f487b55ec81a2bcf6d63bb4130569f45397
                                                                                              • Instruction ID: 661b18b1de4eb1238568a50ab540e77c3175952f9b14320adb6d96c9b056064d
                                                                                              • Opcode Fuzzy Hash: 00c40fca2cfdd97ba02e44e9efda7f487b55ec81a2bcf6d63bb4130569f45397
                                                                                              • Instruction Fuzzy Hash: 80F090B23A17207AF620B57A5C86F7F418CCB89B68F10423BBA04FF1D1D9A85D0555AD
                                                                                              APIs
                                                                                              • IsIconic.USER32(?), ref: 0048397A
                                                                                              • GetWindowLongA.USER32(00000000,000000F0), ref: 00483998
                                                                                              • ShowWindow.USER32(00000000,00000005,00000000,000000F0,0049C0A8,00482E56,00482E8A,00000000,00482EAA,?,?,?,0049C0A8), ref: 004839BA
                                                                                              • ShowWindow.USER32(00000000,00000000,00000000,000000F0,0049C0A8,00482E56,00482E8A,00000000,00482EAA,?,?,?,0049C0A8), ref: 004839CE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Show$IconicLong
                                                                                              • String ID:
                                                                                              • API String ID: 2754861897-0
                                                                                              • Opcode ID: 388bc32bc28a7c539796bab44a6ba9bad50612e2c7d9e5998850325d2fd9b569
                                                                                              • Instruction ID: 3cea9153c2b451a1fdc95e78a984a36fb28f479a74ffefb17a89e5a976076ef3
                                                                                              • Opcode Fuzzy Hash: 388bc32bc28a7c539796bab44a6ba9bad50612e2c7d9e5998850325d2fd9b569
                                                                                              • Instruction Fuzzy Hash: 160156B0705200ABEA00BF659CCBB5F22C55714745F44093BF4459B292CAADDA859B5C
                                                                                              APIs
                                                                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,00462824), ref: 004627A8
                                                                                              • FindNextFileA.KERNEL32(000000FF,?,00000000,00462804,?,00000000,?,00000000,00462824), ref: 004627E4
                                                                                              • FindClose.KERNEL32(000000FF,0046280B,00462804,?,00000000,?,00000000,00462824), ref: 004627FE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Find$File$CloseFirstNext
                                                                                              • String ID:
                                                                                              • API String ID: 3541575487-0
                                                                                              • Opcode ID: b12316252c39c0105a03a3a2020ea099ca75c42189d8bae58c1ecd15a925fcd0
                                                                                              • Instruction ID: e6acefadc91213b77ea930f6be1f86c6134c8588622ee3d3acab995ed1c325b6
                                                                                              • Opcode Fuzzy Hash: b12316252c39c0105a03a3a2020ea099ca75c42189d8bae58c1ecd15a925fcd0
                                                                                              • Instruction Fuzzy Hash: 87210831904B08BECB11EB65CC41ACEB7ACDB49304F5084B7E808E32A1F6789E44CE69
                                                                                              APIs
                                                                                              • IsIconic.USER32(?), ref: 004241E4
                                                                                              • SetActiveWindow.USER32(?,?,?,0046CD53), ref: 004241F1
                                                                                                • Part of subcall function 0042364C: ShowWindow.USER32(00410460,00000009,?,00000000,0041EDA4,0042393A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00423667
                                                                                                • Part of subcall function 00423B14: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,021F25AC,0042420A,?,?,?,0046CD53), ref: 00423B4F
                                                                                              • SetFocus.USER32(00000000,?,?,?,0046CD53), ref: 0042421E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$ActiveFocusIconicShow
                                                                                              • String ID:
                                                                                              • API String ID: 649377781-0
                                                                                              • Opcode ID: 1be179083055f96161d8b165ddd04f1e3bd56871e014c6a07f585ac04199aa1a
                                                                                              • Instruction ID: c953833529836f01456b8f788e47b4b7c36f7a841d6c6df07f57e62630513da6
                                                                                              • Opcode Fuzzy Hash: 1be179083055f96161d8b165ddd04f1e3bd56871e014c6a07f585ac04199aa1a
                                                                                              • Instruction Fuzzy Hash: 8CF030B170012097CB10BFAAA8C5B9676A8AB48344F5500BBBD05DF357CA7CDC018778
                                                                                              APIs
                                                                                              • IsIconic.USER32(?), ref: 00417D0F
                                                                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D2D
                                                                                              • GetWindowPlacement.USER32(?,0000002C), ref: 00417D63
                                                                                              • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D8A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Placement$Iconic
                                                                                              • String ID:
                                                                                              • API String ID: 568898626-0
                                                                                              • Opcode ID: 19084698f29920acc68274fefc6d1be37826273bcf8ca1bc36e8902df026f6c2
                                                                                              • Instruction ID: d9358ea7cd183770b33139a8ac7b7a0a70302bd2c01e5fc8313c3e2814ac7f2c
                                                                                              • Opcode Fuzzy Hash: 19084698f29920acc68274fefc6d1be37826273bcf8ca1bc36e8902df026f6c2
                                                                                              • Instruction Fuzzy Hash: 33012C71204108ABDB10EE59D8C1EF673A8AF45724F154566FD19DF242D639ED8087A8
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CaptureIconic
                                                                                              • String ID:
                                                                                              • API String ID: 2277910766-0
                                                                                              • Opcode ID: c22591b8c3f2be6e3e416ff0957708157ed46c57fff49ed7de8fa542590db40d
                                                                                              • Instruction ID: 6cb7601519473143bf4e876ebf6758ccc8fc4fa751d6c6e0357a6193460a6b05
                                                                                              • Opcode Fuzzy Hash: c22591b8c3f2be6e3e416ff0957708157ed46c57fff49ed7de8fa542590db40d
                                                                                              • Instruction Fuzzy Hash: 0AF0A4723056425BD730AB2EC984AB762F69F84314B14403BE419CBFA1EB3CDCC08798
                                                                                              APIs
                                                                                              • IsIconic.USER32(?), ref: 0042419B
                                                                                                • Part of subcall function 00423A84: EnumWindows.USER32(00423A1C), ref: 00423AA8
                                                                                                • Part of subcall function 00423A84: GetWindow.USER32(?,00000003), ref: 00423ABD
                                                                                                • Part of subcall function 00423A84: GetWindowLongA.USER32(?,000000EC), ref: 00423ACC
                                                                                                • Part of subcall function 00423A84: SetWindowPos.USER32(00000000,\AB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241AB,?,?,00423D73), ref: 00423B02
                                                                                              • SetActiveWindow.USER32(?,?,?,00423D73,00000000,0042415C), ref: 004241AF
                                                                                                • Part of subcall function 0042364C: ShowWindow.USER32(00410460,00000009,?,00000000,0041EDA4,0042393A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00423667
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$ActiveEnumIconicLongShowWindows
                                                                                              • String ID:
                                                                                              • API String ID: 2671590913-0
                                                                                              • Opcode ID: b2ff140757208bd7b7cc33ac29151dbeb423d1cdddd3b288bc041a56f1810338
                                                                                              • Instruction ID: ce5d4440ec1c13bcfda566247f28ea27228b22b89c70f7a48f218b5e8bc86154
                                                                                              • Opcode Fuzzy Hash: b2ff140757208bd7b7cc33ac29151dbeb423d1cdddd3b288bc041a56f1810338
                                                                                              • Instruction Fuzzy Hash: 55E01AA070011087DB10AFAADCC8B9632A9BB48304F55017ABD49CF35BD63CC8608724
                                                                                              APIs
                                                                                              • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,004127D5), ref: 004127C3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: NtdllProc_Window
                                                                                              • String ID:
                                                                                              • API String ID: 4255912815-0
                                                                                              • Opcode ID: 120c9c179850e2d77f2b5158c289480559fb4752f9becda92d3f5c4f199058c9
                                                                                              • Instruction ID: 2c049f03cfb376e3baa0368465928f91904f6d03483072bf0e6cb5f6a46bccc5
                                                                                              • Opcode Fuzzy Hash: 120c9c179850e2d77f2b5158c289480559fb4752f9becda92d3f5c4f199058c9
                                                                                              • Instruction Fuzzy Hash: 4A5102357082048FD710DB6ADA80A9BF3E5EF98314B2082BBD814C77A1D7B8AD91C75D
                                                                                              APIs
                                                                                              • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 00478C0E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: NtdllProc_Window
                                                                                              • String ID:
                                                                                              • API String ID: 4255912815-0
                                                                                              • Opcode ID: 35b14883da97521222dd4ba63ab43259808bc2fdd283b26f07d3c05bbd11cdae
                                                                                              • Instruction ID: 8fc52e73ba06cc46e730b07d7f7f94568764801a7b8f51cd1014d1f63996c257
                                                                                              • Opcode Fuzzy Hash: 35b14883da97521222dd4ba63ab43259808bc2fdd283b26f07d3c05bbd11cdae
                                                                                              • Instruction Fuzzy Hash: EC4148B5A44104DFCB10CF99C6888AAB7F5FB49310B64C99AF848DB701D738EE45DB58
                                                                                              APIs
                                                                                              • ArcFourCrypt._ISCRYPT(?,?,?,0046DEA4,?,?,0046DEA4,00000000), ref: 0045D247
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CryptFour
                                                                                              • String ID:
                                                                                              • API String ID: 2153018856-0
                                                                                              • Opcode ID: 60613f318f2e56de1b1058283c26d55875caf569050bffc963c4b4a7e30f6a75
                                                                                              • Instruction ID: 5effe0378c810cd07e0217cdc1e7a72ed78fe315a0c34b067f2c35eeb24cdbba
                                                                                              • Opcode Fuzzy Hash: 60613f318f2e56de1b1058283c26d55875caf569050bffc963c4b4a7e30f6a75
                                                                                              • Instruction Fuzzy Hash: D0C09BF200420CBF650057D5ECC9C77B75CE6586547408126F7048210195726C104574
                                                                                              APIs
                                                                                              • ArcFourCrypt._ISCRYPT(?,00000000,00000000,000003E8,0046DB14,?,0046DCF5), ref: 0045D25A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CryptFour
                                                                                              • String ID:
                                                                                              • API String ID: 2153018856-0
                                                                                              • Opcode ID: d774fb8793e7b9215c4f3788321c424c537fe54849dfeb2a35b58218e4d2cefe
                                                                                              • Instruction ID: 17600df93846144bfd8e61cd07b91608ca2a028cf3222f5d1774599e6ed580aa
                                                                                              • Opcode Fuzzy Hash: d774fb8793e7b9215c4f3788321c424c537fe54849dfeb2a35b58218e4d2cefe
                                                                                              • Instruction Fuzzy Hash: B7A002F0B80300BAFD2057F15E5EF26252C97D0F01F2084657306E90D085A56400853C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2547340875.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2547278584.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2547362063.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_10000000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                                              • Instruction ID: 1c94840b05858ddf3503627acbaac9226f9c4a6e1659969bf0a936c2f155f8a0
                                                                                              • Opcode Fuzzy Hash: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                                              • Instruction Fuzzy Hash: FF11303254D3D28FC305CF2894506D6FFE4AF6A640F194AAEE1D45B203C2659549C7A2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2547340875.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2547278584.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2547362063.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_10000000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                                              • Instruction ID: 837d35c9df4effc004866add7a9100bdfed479f04b3922bb4bd4c5469ecd81ba
                                                                                              • Opcode Fuzzy Hash: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                                              • Instruction Fuzzy Hash:
                                                                                              APIs
                                                                                                • Part of subcall function 0044B604: GetVersionExA.KERNEL32(00000094), ref: 0044B621
                                                                                              • LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F775,00498BF2), ref: 0044B67F
                                                                                              • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B697
                                                                                              • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6A9
                                                                                              • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6BB
                                                                                              • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6CD
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6DF
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6F1
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B703
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B715
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B727
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B739
                                                                                              • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B74B
                                                                                              • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B75D
                                                                                              • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B76F
                                                                                              • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B781
                                                                                              • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B793
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7A5
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7B7
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044B7C9
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044B7DB
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044B7ED
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044B7FF
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044B811
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044B823
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044B835
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044B847
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044B859
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044B86B
                                                                                              • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044B87D
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044B88F
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044B8A1
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044B8B3
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044B8C5
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044B8D7
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044B8E9
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044B8FB
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044B90D
                                                                                              • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044B91F
                                                                                              • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044B931
                                                                                              • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044B943
                                                                                              • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044B955
                                                                                              • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044B967
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044B979
                                                                                              • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044B98B
                                                                                              • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044B99D
                                                                                              • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044B9AF
                                                                                              • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044B9C1
                                                                                              • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044B9D3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$LibraryLoadVersion
                                                                                              • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                                                                              • API String ID: 1968650500-2910565190
                                                                                              • Opcode ID: 4248c38413e99d9464b79edb7fe9b1fdc4fa56b35b8262d24df0eec612bb70b6
                                                                                              • Instruction ID: e93aa9000a3b975727f71862fff1c9a8a52c50bca2d3d110ef64c9f3a3b13d35
                                                                                              • Opcode Fuzzy Hash: 4248c38413e99d9464b79edb7fe9b1fdc4fa56b35b8262d24df0eec612bb70b6
                                                                                              • Instruction Fuzzy Hash: D391A8F0A40B11ABEB00EFB5AD96A2A3BA8EB15714310067BB454DF295D778DC108FDD
                                                                                              APIs
                                                                                              • GetDC.USER32(00000000), ref: 0041CA40
                                                                                              • CreateCompatibleDC.GDI32(?), ref: 0041CA4C
                                                                                              • CreateBitmap.GDI32(0041A944,?,00000001,00000001,00000000), ref: 0041CA70
                                                                                              • CreateCompatibleBitmap.GDI32(?,0041A944,?), ref: 0041CA80
                                                                                              • SelectObject.GDI32(0041CE3C,00000000), ref: 0041CA9B
                                                                                              • FillRect.USER32(0041CE3C,?,?), ref: 0041CAD6
                                                                                              • SetTextColor.GDI32(0041CE3C,00000000), ref: 0041CAEB
                                                                                              • SetBkColor.GDI32(0041CE3C,00000000), ref: 0041CB02
                                                                                              • PatBlt.GDI32(0041CE3C,00000000,00000000,0041A944,?,00FF0062), ref: 0041CB18
                                                                                              • CreateCompatibleDC.GDI32(?), ref: 0041CB2B
                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 0041CB5C
                                                                                              • SelectPalette.GDI32(00000000,00000000,00000001), ref: 0041CB74
                                                                                              • RealizePalette.GDI32(00000000), ref: 0041CB7D
                                                                                              • SelectPalette.GDI32(0041CE3C,00000000,00000001), ref: 0041CB8C
                                                                                              • RealizePalette.GDI32(0041CE3C), ref: 0041CB95
                                                                                              • SetTextColor.GDI32(00000000,00000000), ref: 0041CBAE
                                                                                              • SetBkColor.GDI32(00000000,00000000), ref: 0041CBC5
                                                                                              • BitBlt.GDI32(0041CE3C,00000000,00000000,0041A944,?,00000000,00000000,00000000,00CC0020), ref: 0041CBE1
                                                                                              • SelectObject.GDI32(00000000,?), ref: 0041CBEE
                                                                                              • DeleteDC.GDI32(00000000), ref: 0041CC04
                                                                                                • Part of subcall function 0041A058: GetSysColor.USER32(?), ref: 0041A062
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ColorSelect$CreatePalette$CompatibleObject$BitmapRealizeText$DeleteFillRect
                                                                                              • String ID:
                                                                                              • API String ID: 269503290-0
                                                                                              • Opcode ID: 8288b1a004c19d08e53adfd80f36b756ff19622159534b91a17c952f52f31838
                                                                                              • Instruction ID: 91afdf38925dfcc0a19aef53af63d8b93a06df8cfedaf367688fa0d34ebdb442
                                                                                              • Opcode Fuzzy Hash: 8288b1a004c19d08e53adfd80f36b756ff19622159534b91a17c952f52f31838
                                                                                              • Instruction Fuzzy Hash: 01610071A44648AFDF10EBE9DC86FDFB7B8EB48704F10446AB504E7281D67CA940CB68
                                                                                              APIs
                                                                                              • CoCreateInstance.OLE32(00499A74,00000000,00000001,00499774,?,00000000,004569E3), ref: 0045667E
                                                                                              • CoCreateInstance.OLE32(00499764,00000000,00000001,00499774,?,00000000,004569E3), ref: 004566A4
                                                                                              • SysFreeString.OLEAUT32(00000000), ref: 0045685B
                                                                                              Strings
                                                                                              • IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning), xrefs: 004567F1
                                                                                              • IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption), xrefs: 004568CA
                                                                                              • IPersistFile::Save, xrefs: 00456962
                                                                                              • IShellLink::QueryInterface(IID_IPropertyStore), xrefs: 004567BD
                                                                                              • IShellLink::QueryInterface(IID_IPersistFile), xrefs: 00456904
                                                                                              • IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall), xrefs: 00456892
                                                                                              • %ProgramFiles(x86)%\, xrefs: 0045672E
                                                                                              • IPropertyStore::SetValue(PKEY_AppUserModel_ID), xrefs: 00456840
                                                                                              • CoCreateInstance, xrefs: 004566AF
                                                                                              • {pf32}\, xrefs: 0045671E
                                                                                              • IPropertyStore::Commit, xrefs: 004568E3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateInstance$FreeString
                                                                                              • String ID: %ProgramFiles(x86)%\$CoCreateInstance$IPersistFile::Save$IPropertyStore::Commit$IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)$IPropertyStore::SetValue(PKEY_AppUserModel_ID)$IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)$IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption)$IShellLink::QueryInterface(IID_IPersistFile)$IShellLink::QueryInterface(IID_IPropertyStore)${pf32}\
                                                                                              • API String ID: 308859552-2363233914
                                                                                              • Opcode ID: 26ac11ebc8d2bbba6934e2b7da4071208c956f88b3f37f3572524cf0602978ca
                                                                                              • Instruction ID: 2d3acbfbfe5134b3b68b6dcde43dfe431d970b0eaffbfac770a5f5266a6492d0
                                                                                              • Opcode Fuzzy Hash: 26ac11ebc8d2bbba6934e2b7da4071208c956f88b3f37f3572524cf0602978ca
                                                                                              • Instruction Fuzzy Hash: 39B13170A00104AFDB50DFA9C845B9E7BF8AF09706F5540AAF804E7362DB78DD48CB69
                                                                                              APIs
                                                                                              • ShowWindow.USER32(?,00000005,00000000,00498768,?,?,00000000,?,00000000,00000000,?,00498B1F,00000000,00498B29,?,00000000), ref: 00498453
                                                                                              • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498768,?,?,00000000,?,00000000,00000000,?,00498B1F,00000000), ref: 00498466
                                                                                              • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498768,?,?,00000000,?,00000000,00000000), ref: 00498476
                                                                                              • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00498497
                                                                                              • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498768,?,?,00000000,?,00000000), ref: 004984A7
                                                                                                • Part of subcall function 0042D44C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4DA,?,?,?,00000001,?,0045607E,00000000,004560E6), ref: 0042D481
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                                                                                              • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup
                                                                                              • API String ID: 2000705611-3672972446
                                                                                              • Opcode ID: d895cb7c5264c7428a24ad32bd1f4b93e6c699b182eb53adebeee5f7002e5ba1
                                                                                              • Instruction ID: 1a66146e65e487955493167600903b91e60bc3637ed1504a34615a6495e02ea1
                                                                                              • Opcode Fuzzy Hash: d895cb7c5264c7428a24ad32bd1f4b93e6c699b182eb53adebeee5f7002e5ba1
                                                                                              • Instruction Fuzzy Hash: 5191A434A042049FDF11EBA9DC52BAE7BE5EF4A304F5144BBF500AB692DE7C9C05CA19
                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(00000000,0045A994), ref: 0045A846
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast
                                                                                              • String ID: .chm$.chw$.fts$.gid$.hlp$.lnk$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                                                                                              • API String ID: 1452528299-3112430753
                                                                                              • Opcode ID: 897371adc22cb023c4f91e5d84e86364b249416017dada323b4764b4a4f9f98f
                                                                                              • Instruction ID: 43962401d403c06de7b31dde6fd87328655f81364e16ca473e433d379c6e1912
                                                                                              • Opcode Fuzzy Hash: 897371adc22cb023c4f91e5d84e86364b249416017dada323b4764b4a4f9f98f
                                                                                              • Instruction Fuzzy Hash: EC719070B002545BCB00EB6998417AE77A49F4931AF91896BFC01AB383DB7C9E1DC75E
                                                                                              APIs
                                                                                              • GetVersion.KERNEL32 ref: 0045CBDA
                                                                                              • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045CBFA
                                                                                              • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoW), ref: 0045CC07
                                                                                              • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoW), ref: 0045CC14
                                                                                              • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045CC22
                                                                                                • Part of subcall function 0045CAC8: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0045CB67,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045CB41
                                                                                              • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045CE15,?,?,00000000), ref: 0045CCDB
                                                                                              • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045CE15,?,?,00000000), ref: 0045CCE4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$AllocateByteCharErrorHandleInitializeLastModuleMultiVersionWide
                                                                                              • String ID: GetNamedSecurityInfoW$SetEntriesInAclW$SetNamedSecurityInfoW$W$advapi32.dll
                                                                                              • API String ID: 59345061-4263478283
                                                                                              • Opcode ID: a232fc9af4861a9c5d561c4cdd8364b97c4fb44f2e207c549b4316288fabcd11
                                                                                              • Instruction ID: 99773ef8a3d0261052733c4904a47669a242c0659fe16ead1f438c4abb71ff4e
                                                                                              • Opcode Fuzzy Hash: a232fc9af4861a9c5d561c4cdd8364b97c4fb44f2e207c549b4316288fabcd11
                                                                                              • Instruction Fuzzy Hash: BD518471900308EFDB10DF99C881BEEBBB8EB48711F14806AF904E7241C678A945CFA9
                                                                                              APIs
                                                                                              • CreateCompatibleDC.GDI32(00000000), ref: 0041B3C3
                                                                                              • CreateCompatibleDC.GDI32(00000000), ref: 0041B3CD
                                                                                              • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B3DF
                                                                                              • CreateBitmap.GDI32(0000000B,?,00000001,00000001,00000000), ref: 0041B3F6
                                                                                              • GetDC.USER32(00000000), ref: 0041B402
                                                                                              • CreateCompatibleBitmap.GDI32(00000000,0000000B,?), ref: 0041B42F
                                                                                              • ReleaseDC.USER32(00000000,00000000), ref: 0041B455
                                                                                              • SelectObject.GDI32(00000000,?), ref: 0041B470
                                                                                              • SelectObject.GDI32(?,00000000), ref: 0041B47F
                                                                                              • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4AB
                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 0041B4B9
                                                                                              • SelectObject.GDI32(?,00000000), ref: 0041B4C7
                                                                                              • DeleteDC.GDI32(00000000), ref: 0041B4D0
                                                                                              • DeleteDC.GDI32(?), ref: 0041B4D9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Object$CreateSelect$Compatible$BitmapDelete$ReleaseStretch
                                                                                              • String ID:
                                                                                              • API String ID: 644427674-0
                                                                                              • Opcode ID: 9212dc48eb065078ffd6e64a0fe4b3e7e755c3ed7e1f96497366cc94fc87ddf9
                                                                                              • Instruction ID: 0f3e5998203d07172116f12fa3fedaa120d09cd030f2870c51d139f455c41937
                                                                                              • Opcode Fuzzy Hash: 9212dc48eb065078ffd6e64a0fe4b3e7e755c3ed7e1f96497366cc94fc87ddf9
                                                                                              • Instruction Fuzzy Hash: E941AD71E44619AFDB10DAE9C846FEFB7BCEB08704F104466B614F7281D6786D408BA8
                                                                                              APIs
                                                                                                • Part of subcall function 0042C804: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C828
                                                                                              • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00472D00
                                                                                              • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 00472E07
                                                                                              • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 00472E1D
                                                                                              • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 00472E42
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
                                                                                              • String ID: .lnk$.pif$.url$Desktop.ini$Filename: %s$target.lnk${group}\
                                                                                              • API String ID: 971782779-3668018701
                                                                                              • Opcode ID: ec03a6b44b0f4cd57b1805575295038081ef414545ebdff26f55f13b118b0783
                                                                                              • Instruction ID: 7edda302242157afef40b0e7c7e05039b068dedd9e36cd510e855ba872eb221a
                                                                                              • Opcode Fuzzy Hash: ec03a6b44b0f4cd57b1805575295038081ef414545ebdff26f55f13b118b0783
                                                                                              • Instruction Fuzzy Hash: D0D14574A001489FDB11EFA9D981BDDBBF4AF08304F50816AF904B7392C778AE45CB69
                                                                                              APIs
                                                                                                • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                              • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,?,00000000,00454B0D,?,?,00000003,00000000,00000000,00454B44), ref: 0045498D
                                                                                                • Part of subcall function 0042E8C8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453273,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8E7
                                                                                              • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000000,?,00000004,00000000,00454A57,?,?,00000000,00000000,?,00000000,?,00000000), ref: 00454A11
                                                                                              • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000000,?,00000004,00000000,00454A57,?,?,00000000,00000000,?,00000000,?,00000000), ref: 00454A40
                                                                                              Strings
                                                                                              • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004548AB
                                                                                              • RegOpenKeyEx, xrefs: 00454910
                                                                                              • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004548E4
                                                                                              • , xrefs: 004548FE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: QueryValue$FormatMessageOpen
                                                                                              • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                                              • API String ID: 2812809588-1577016196
                                                                                              • Opcode ID: aec1327b0b0803e0d56dc0c3992fac0afe6f111b5b563ab43accc1af076cf8f5
                                                                                              • Instruction ID: 3b35aed17da8244e85d272d2923899a44a2159637523a8fd9e70e85f8d21f96a
                                                                                              • Opcode Fuzzy Hash: aec1327b0b0803e0d56dc0c3992fac0afe6f111b5b563ab43accc1af076cf8f5
                                                                                              • Instruction Fuzzy Hash: 23914871E44148ABDB10DF95C842BDEB7FCEB49309F50406BF900FB282D6789E458B69
                                                                                              APIs
                                                                                                • Part of subcall function 00459364: RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,004594A1,00000000,00459659,?,00000000,00000000,00000000), ref: 004593B1
                                                                                              • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459659,?,00000000,00000000,00000000), ref: 004594FF
                                                                                              • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459659,?,00000000,00000000,00000000), ref: 00459569
                                                                                                • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                              • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00000001,00000000,00000000,00459659,?,00000000,00000000,00000000), ref: 004595D0
                                                                                              Strings
                                                                                              • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 0045951C
                                                                                              • v4.0.30319, xrefs: 004594F1
                                                                                              • .NET Framework not found, xrefs: 0045961D
                                                                                              • v1.1.4322, xrefs: 004595C2
                                                                                              • SOFTWARE\Microsoft\.NETFramework\Policy\v4.0, xrefs: 004594B2
                                                                                              • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 00459583
                                                                                              • v2.0.50727, xrefs: 0045955B
                                                                                              • .NET Framework version %s not found, xrefs: 00459609
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Close$Open
                                                                                              • String ID: .NET Framework not found$.NET Framework version %s not found$SOFTWARE\Microsoft\.NETFramework\Policy\v1.1$SOFTWARE\Microsoft\.NETFramework\Policy\v2.0$SOFTWARE\Microsoft\.NETFramework\Policy\v4.0$v1.1.4322$v2.0.50727$v4.0.30319
                                                                                              • API String ID: 2976201327-446240816
                                                                                              • Opcode ID: 06cdcde3b802fa8939e5b925d5f0cc04c3aa7329a2dd441772a6abba54712f42
                                                                                              • Instruction ID: e7879d346446e6db82ad1067b50e8ffdd52b59a139ce3e0e88c8f748029a0227
                                                                                              • Opcode Fuzzy Hash: 06cdcde3b802fa8939e5b925d5f0cc04c3aa7329a2dd441772a6abba54712f42
                                                                                              • Instruction Fuzzy Hash: EB51A331A04148EBCB01DFA8C8A1BEE77A5DB59305F54447BA801DB353EA3D9E1ECB19
                                                                                              APIs
                                                                                              • CloseHandle.KERNEL32(?), ref: 00458A7B
                                                                                              • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 00458A97
                                                                                              • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 00458AA5
                                                                                              • GetExitCodeProcess.KERNEL32(?), ref: 00458AB6
                                                                                              • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458AFD
                                                                                              • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458B19
                                                                                              Strings
                                                                                              • Helper process exited with failure code: 0x%x, xrefs: 00458AE3
                                                                                              • Helper isn't responding; killing it., xrefs: 00458A87
                                                                                              • Helper process exited., xrefs: 00458AC5
                                                                                              • Helper process exited, but failed to get exit code., xrefs: 00458AEF
                                                                                              • Stopping 64-bit helper process. (PID: %u), xrefs: 00458A6D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                                                                                              • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                                                                                              • API String ID: 3355656108-1243109208
                                                                                              • Opcode ID: 5acb86a21610ff93fc26a18ca7688f4a609edf5baed34ffefeefbdc5f868b4c1
                                                                                              • Instruction ID: 3f2324d87e707cedf1d5c4e10b6e93e7b0b52df74c864805f1ac214018e434b5
                                                                                              • Opcode Fuzzy Hash: 5acb86a21610ff93fc26a18ca7688f4a609edf5baed34ffefeefbdc5f868b4c1
                                                                                              • Instruction Fuzzy Hash: 2F2130706087409AD720E779C44575BB6D49F08345F04CC2FF99AEB283DF78E8488B2A
                                                                                              APIs
                                                                                                • Part of subcall function 0042DDE4: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE10
                                                                                              • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,004546FF,?,00000000,004547C3), ref: 0045464F
                                                                                              • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,004546FF,?,00000000,004547C3), ref: 0045478B
                                                                                                • Part of subcall function 0042E8C8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453273,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8E7
                                                                                              Strings
                                                                                              • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454567
                                                                                              • , xrefs: 004545B1
                                                                                              • RegCreateKeyEx, xrefs: 004545C3
                                                                                              • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454597
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseCreateFormatMessageQueryValue
                                                                                              • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                                              • API String ID: 2481121983-1280779767
                                                                                              • Opcode ID: f9c0919aa15cd1947ef757741bec092e2a41be70418b738709af356a648b502b
                                                                                              • Instruction ID: 93c55a0ab54dbcba353dd8d7ef9dbdddde8d62e860aeeeeaccb8ee2ace91ec52
                                                                                              • Opcode Fuzzy Hash: f9c0919aa15cd1947ef757741bec092e2a41be70418b738709af356a648b502b
                                                                                              • Instruction Fuzzy Hash: 49810F75A00209AFDB00DFD5C981BDEB7B8EB49309F10452AF900FB282D7789E45CB69
                                                                                              APIs
                                                                                                • Part of subcall function 004538BC: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,!nI,_iu,?,00000000,004539F6), ref: 004539AB
                                                                                                • Part of subcall function 004538BC: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,!nI,_iu,?,00000000,004539F6), ref: 004539BB
                                                                                              • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 00496CCD
                                                                                              • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00496E21), ref: 00496CEE
                                                                                              • CreateWindowExA.USER32(00000000,STATIC,00496E30,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 00496D15
                                                                                              • SetWindowLongA.USER32(?,000000FC,004964A8), ref: 00496D28
                                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00496DF4,?,?,000000FC,004964A8,00000000,STATIC,00496E30), ref: 00496D58
                                                                                              • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00496DCC
                                                                                              • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00496DF4,?,?,000000FC,004964A8,00000000), ref: 00496DD8
                                                                                                • Part of subcall function 00453D30: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E17
                                                                                              • DestroyWindow.USER32(?,00496DFB,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00496DF4,?,?,000000FC,004964A8,00000000,STATIC), ref: 00496DEE
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$File$CloseCreateHandle$AttributesCopyDestroyLongMultipleObjectsPrivateProfileStringWaitWrite
                                                                                              • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                                                                                              • API String ID: 1549857992-2312673372
                                                                                              • Opcode ID: e4b2ecfcfa893ff17553470f1835d2c21342bacfaf5c8ca03e615e843d4af16f
                                                                                              • Instruction ID: 18f462a79ff6f3765b6ab1b49dcd34ad23a8ddcce266b6658739bc0f5698dca4
                                                                                              • Opcode Fuzzy Hash: e4b2ecfcfa893ff17553470f1835d2c21342bacfaf5c8ca03e615e843d4af16f
                                                                                              • Instruction Fuzzy Hash: 61414C70A40208AFDF00EBA5DD42F9E7BB8EB08714F52457AF510F7291D7799E008B68
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E51D,?,00000000,0047E6DC,00000000), ref: 0042E441
                                                                                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E447
                                                                                              • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E51D,?,00000000,0047E6DC,00000000), ref: 0042E495
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressCloseHandleModuleProc
                                                                                              • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$QaE$kernel32.dll
                                                                                              • API String ID: 4190037839-2312295185
                                                                                              • Opcode ID: 6084c433af3ee4d64f0cd9982e7ad42a34d4dd09e5920a5815d9b88696e74604
                                                                                              • Instruction ID: f42d7e7755912f49377b3a3c2778cbb45b18f2cdc7334bb7b0fb93ca3fe573dd
                                                                                              • Opcode Fuzzy Hash: 6084c433af3ee4d64f0cd9982e7ad42a34d4dd09e5920a5815d9b88696e74604
                                                                                              • Instruction Fuzzy Hash: E8213230B10225BBDB10EAE6DC51B9E76B8EB44308F90447BA504E7281E77CDE419B5C
                                                                                              APIs
                                                                                              • GetActiveWindow.USER32 ref: 004629FC
                                                                                              • GetModuleHandleA.KERNEL32(user32.dll), ref: 00462A10
                                                                                              • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 00462A1D
                                                                                              • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00462A2A
                                                                                              • GetWindowRect.USER32(?,00000000), ref: 00462A76
                                                                                              • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 00462AB4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                                              • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                                              • API String ID: 2610873146-3407710046
                                                                                              • Opcode ID: 49e394185691d1c2da29acdf0cb3719649ef4a9244e3d7219ece30713ed86938
                                                                                              • Instruction ID: 865a179037155f8fdabe2954c964c2dd38b7d55406d5d1e7c7801a7b23b437f8
                                                                                              • Opcode Fuzzy Hash: 49e394185691d1c2da29acdf0cb3719649ef4a9244e3d7219ece30713ed86938
                                                                                              • Instruction Fuzzy Hash: B7219575701B057BD610D6A88D85F3B36D8EB84715F094A2AF944DB3C1E6F8EC018B9A
                                                                                              APIs
                                                                                              • GetActiveWindow.USER32 ref: 0042F194
                                                                                              • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042F1A8
                                                                                              • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042F1B5
                                                                                              • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042F1C2
                                                                                              • GetWindowRect.USER32(?,00000000), ref: 0042F20E
                                                                                              • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042F24C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                                              • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                                              • API String ID: 2610873146-3407710046
                                                                                              • Opcode ID: d786bd72f778b9cca068a569f688e0802e61ee9ccadb1309323c976dabd5d685
                                                                                              • Instruction ID: 50a2e38ba83faf67dd7c56e8d7733487d454ef14a416094e89dadcccf0bf0910
                                                                                              • Opcode Fuzzy Hash: d786bd72f778b9cca068a569f688e0802e61ee9ccadb1309323c976dabd5d685
                                                                                              • Instruction Fuzzy Hash: 3821F279704710ABD300EA68ED41F3B37A9DB89714F88457AF944DB382DA79EC044BA9
                                                                                              APIs
                                                                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,00458DFB,?,00000000,00458E5E,?,?,021F3858,00000000), ref: 00458C79
                                                                                              • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,021F3858,?,00000000,00458D90,?,00000000,00000001,00000000,00000000,00000000,00458DFB), ref: 00458CD6
                                                                                              • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,021F3858,?,00000000,00458D90,?,00000000,00000001,00000000,00000000,00000000,00458DFB), ref: 00458CE3
                                                                                              • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00458D2F
                                                                                              • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,00458D69,?,-00000020,0000000C,-00004034,00000014,021F3858,?,00000000,00458D90,?,00000000), ref: 00458D55
                                                                                              • GetLastError.KERNEL32(?,?,00000000,00000001,00458D69,?,-00000020,0000000C,-00004034,00000014,021F3858,?,00000000,00458D90,?,00000000), ref: 00458D5C
                                                                                                • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                                                                                              • String ID: CreateEvent$TransactNamedPipe
                                                                                              • API String ID: 2182916169-3012584893
                                                                                              • Opcode ID: 7b509680db312d6d9eeee96a6ca75077f36d693cf911451bc7dd7bcd49c3517f
                                                                                              • Instruction ID: 06b5d05a5e38ae799b2edb69ba26f0faef77b18cb4ad173b91f5c3c95d125767
                                                                                              • Opcode Fuzzy Hash: 7b509680db312d6d9eeee96a6ca75077f36d693cf911451bc7dd7bcd49c3517f
                                                                                              • Instruction Fuzzy Hash: EF418E75A00608AFDB15DF95C981F9EB7F8EB48714F1044AAF900F72D2DA789E44CA28
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,00456E85), ref: 00456D48
                                                                                              • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 00456D4E
                                                                                              • LoadTypeLib.OLEAUT32(00000000,?), ref: 00456D9B
                                                                                                • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressErrorHandleLastLoadModuleProcType
                                                                                              • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                                                                                              • API String ID: 1914119943-2711329623
                                                                                              • Opcode ID: e2963ea3afedc97cdb575031c9274042e2bd1e61e6c3a56a36b999a051922bf2
                                                                                              • Instruction ID: d1bb8c6bfccdc0522a96f5e3020b18907c52df716e7671809b7eaf465cfb4023
                                                                                              • Opcode Fuzzy Hash: e2963ea3afedc97cdb575031c9274042e2bd1e61e6c3a56a36b999a051922bf2
                                                                                              • Instruction Fuzzy Hash: 6831A375A00604AFDB41EFAACC12D5BB7BDEB8970675244A6FD04D3352DB38DD08CA28
                                                                                              APIs
                                                                                              • RectVisible.GDI32(?,?), ref: 00416E13
                                                                                              • SaveDC.GDI32(?), ref: 00416E27
                                                                                              • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00416E4A
                                                                                              • RestoreDC.GDI32(?,?), ref: 00416E65
                                                                                              • CreateSolidBrush.GDI32(00000000), ref: 00416EE5
                                                                                              • FrameRect.USER32(?,?,?), ref: 00416F18
                                                                                              • DeleteObject.GDI32(?), ref: 00416F22
                                                                                              • CreateSolidBrush.GDI32(00000000), ref: 00416F32
                                                                                              • FrameRect.USER32(?,?,?), ref: 00416F65
                                                                                              • DeleteObject.GDI32(?), ref: 00416F6F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                                                                              • String ID:
                                                                                              • API String ID: 375863564-0
                                                                                              • Opcode ID: c69605c35faac69eeef83e1ef2bcb629ef32bf90482d96ab6e01708da643fe70
                                                                                              • Instruction ID: c082a38e55a2621cff38c0036c5e412d4739722926df34ebe37a7eff5f7859fc
                                                                                              • Opcode Fuzzy Hash: c69605c35faac69eeef83e1ef2bcb629ef32bf90482d96ab6e01708da643fe70
                                                                                              • Instruction Fuzzy Hash: 70515A712086459FDB50EF69C8C4B9B77E8AF48314F15466AFD488B286C738EC81CB99
                                                                                              APIs
                                                                                              • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
                                                                                              • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
                                                                                              • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
                                                                                              • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
                                                                                              • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
                                                                                              • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
                                                                                              • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
                                                                                              • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
                                                                                              • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
                                                                                              • GetLastError.KERNEL32(000000F5), ref: 00404C46
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                                              • String ID:
                                                                                              • API String ID: 1694776339-0
                                                                                              • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                                              • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
                                                                                              • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                                              • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
                                                                                              APIs
                                                                                              • GetSystemMenu.USER32(00000000,00000000), ref: 00422233
                                                                                              • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 00422251
                                                                                              • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042225E
                                                                                              • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042226B
                                                                                              • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422278
                                                                                              • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 00422285
                                                                                              • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 00422292
                                                                                              • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 0042229F
                                                                                              • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 004222BD
                                                                                              • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 004222D9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$Delete$EnableItem$System
                                                                                              • String ID:
                                                                                              • API String ID: 3985193851-0
                                                                                              • Opcode ID: 794ac4a4d1563d503d4e128f610caca5ba976f2c29ed192f4e654ec8c2abe850
                                                                                              • Instruction ID: 662ae76830c3dbb110fd6952920e185112f137d20e740dc0dcce1beff7d7cd05
                                                                                              • Opcode Fuzzy Hash: 794ac4a4d1563d503d4e128f610caca5ba976f2c29ed192f4e654ec8c2abe850
                                                                                              • Instruction Fuzzy Hash: AF2144703407047AE720E724CD8BF9BBBD89B04708F5451A5BA487F6D3C6F9AB804698
                                                                                              APIs
                                                                                              • FreeLibrary.KERNEL32(10000000), ref: 00481A11
                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 00481A25
                                                                                              • SendNotifyMessageA.USER32(000204A8,00000496,00002710,00000000), ref: 00481A97
                                                                                              Strings
                                                                                              • Deinitializing Setup., xrefs: 00481872
                                                                                              • GetCustomSetupExitCode, xrefs: 004818B1
                                                                                              • Restarting Windows., xrefs: 00481A72
                                                                                              • DeinitializeSetup, xrefs: 0048190D
                                                                                              • Not restarting Windows because Setup is being run from the debugger., xrefs: 00481A46
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeLibrary$MessageNotifySend
                                                                                              • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                                                                                              • API String ID: 3817813901-1884538726
                                                                                              • Opcode ID: b2d1279a618dd00e76101f6ddb87be929459601488252b11527f6c6d16611b1a
                                                                                              • Instruction ID: b122ee3e0244d1cffd13458a0655c780be2d4a3cdc4850abd58d30bc7702deed
                                                                                              • Opcode Fuzzy Hash: b2d1279a618dd00e76101f6ddb87be929459601488252b11527f6c6d16611b1a
                                                                                              • Instruction Fuzzy Hash: C651BF347042409FD715EB69E9A5B6E7BE8EB19314F10887BE800C72B2DB389C46CB5D
                                                                                              APIs
                                                                                              • SHGetMalloc.SHELL32(?), ref: 004616C7
                                                                                              • GetActiveWindow.USER32 ref: 0046172B
                                                                                              • CoInitialize.OLE32(00000000), ref: 0046173F
                                                                                              • SHBrowseForFolder.SHELL32(?), ref: 00461756
                                                                                              • CoUninitialize.OLE32(00461797,00000000,?,?,?,?,?,00000000,0046181B), ref: 0046176B
                                                                                              • SetActiveWindow.USER32(?,00461797,00000000,?,?,?,?,?,00000000,0046181B), ref: 00461781
                                                                                              • SetActiveWindow.USER32(?,?,00461797,00000000,?,?,?,?,?,00000000,0046181B), ref: 0046178A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ActiveWindow$BrowseFolderInitializeMallocUninitialize
                                                                                              • String ID: A
                                                                                              • API String ID: 2684663990-3554254475
                                                                                              • Opcode ID: cb3d39f68a826354347aa7a8a61ff080deb010c50648a66159b3978de9eda5bc
                                                                                              • Instruction ID: 0f37cca2ee7d5c89cd5c8fe3b5c5f67eac08b275376d6c087401a1ac056189be
                                                                                              • Opcode Fuzzy Hash: cb3d39f68a826354347aa7a8a61ff080deb010c50648a66159b3978de9eda5bc
                                                                                              • Instruction Fuzzy Hash: C3312F70E00348AFDB10EFA6D885A9EBBF8EB09304F55847AF404E7251E7785A048F59
                                                                                              APIs
                                                                                              • GetFileAttributesA.KERNEL32(00000000,00000000,00472AB9,?,?,?,00000008,00000000,00000000,00000000,?,00472D15,?,?,00000000,00472F84), ref: 00472A1C
                                                                                                • Part of subcall function 0042CD94: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0042CE0A
                                                                                                • Part of subcall function 00406F50: DeleteFileA.KERNEL32(00000000,0049B628,004986F1,00000000,00498746,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F5B
                                                                                              • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00472AB9,?,?,?,00000008,00000000,00000000,00000000,?,00472D15), ref: 00472A93
                                                                                              • RemoveDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00472AB9,?,?,?,00000008,00000000,00000000,00000000), ref: 00472A99
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$Attributes$DeleteDirectoryPrivateProfileRemoveString
                                                                                              • String ID: .ShellClassInfo$CLSID2$desktop.ini$target.lnk${0AFACED1-E828-11D1-9187-B532F1E9575D}
                                                                                              • API String ID: 884541143-1710247218
                                                                                              • Opcode ID: c45dacd24f7b5bc8c90ad3d0814151273abff7c22a7deb77a2667df06dffab17
                                                                                              • Instruction ID: 1765d5ebfc4e6887f49e3816ac39c9d5a3c16910e93b0aec031ce55b1572895b
                                                                                              • Opcode Fuzzy Hash: c45dacd24f7b5bc8c90ad3d0814151273abff7c22a7deb77a2667df06dffab17
                                                                                              • Instruction Fuzzy Hash: 6711B2707005147BD721EAAA8D82B9F73ACDB49714F61C17BB404B72C2DBBCAE01861C
                                                                                              APIs
                                                                                              • GetProcAddress.KERNEL32(00000000,inflateInit_), ref: 0045D2BD
                                                                                              • GetProcAddress.KERNEL32(00000000,inflate), ref: 0045D2CD
                                                                                              • GetProcAddress.KERNEL32(00000000,inflateEnd), ref: 0045D2DD
                                                                                              • GetProcAddress.KERNEL32(00000000,inflateReset), ref: 0045D2ED
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc
                                                                                              • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                                                                                              • API String ID: 190572456-3516654456
                                                                                              • Opcode ID: 5039b32c95ab4f878aa340bc95ef1656196d0563f790867e571847c0b893819f
                                                                                              • Instruction ID: d913f85fec6517a53d2ec7ba369195fd603025f4bffd93910817278a70f0814a
                                                                                              • Opcode Fuzzy Hash: 5039b32c95ab4f878aa340bc95ef1656196d0563f790867e571847c0b893819f
                                                                                              • Instruction Fuzzy Hash: C20112B0D00701DBE724DFF6ACC672636A5ABA8306F14C03B9D09962A2D77D0459DF2E
                                                                                              APIs
                                                                                              • SetBkColor.GDI32(?,00000000), ref: 0041A9B9
                                                                                              • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 0041A9F3
                                                                                              • SetBkColor.GDI32(?,?), ref: 0041AA08
                                                                                              • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041AA52
                                                                                              • SetTextColor.GDI32(00000000,00000000), ref: 0041AA5D
                                                                                              • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041AA6D
                                                                                              • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AAAC
                                                                                              • SetTextColor.GDI32(00000000,00000000), ref: 0041AAB6
                                                                                              • SetBkColor.GDI32(00000000,?), ref: 0041AAC3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Color$StretchText
                                                                                              • String ID:
                                                                                              • API String ID: 2984075790-0
                                                                                              • Opcode ID: c2c61a06e11fc6ac6c72d0136d8e20986a2ab5507b690e8d84a304c9a27ba9fd
                                                                                              • Instruction ID: 4467ea82dd13d464879b0bd0dd0607b47ee3045dce17e21d2c6451b7f26a8ea4
                                                                                              • Opcode Fuzzy Hash: c2c61a06e11fc6ac6c72d0136d8e20986a2ab5507b690e8d84a304c9a27ba9fd
                                                                                              • Instruction Fuzzy Hash: 8761E5B5A00505AFCB40EFADD985E9AB7F8EF08314B10816AF908DB262C775ED40CF58
                                                                                              APIs
                                                                                                • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                                                              • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00458278,?, /s ",?,regsvr32.exe",?,00458278), ref: 004581EA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseDirectoryHandleSystem
                                                                                              • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
                                                                                              • API String ID: 2051275411-1862435767
                                                                                              • Opcode ID: 4002d2de1ab03b38d977d670fcb0d45de6735b09ab9cf6adf03ef289ce7e4165
                                                                                              • Instruction ID: cda81b302c56d3c3b7af3d8ffa4af26d40175ae7a7c1cff7e24eee752c39b11a
                                                                                              • Opcode Fuzzy Hash: 4002d2de1ab03b38d977d670fcb0d45de6735b09ab9cf6adf03ef289ce7e4165
                                                                                              • Instruction Fuzzy Hash: 21411670A047486BDB10EFD6D842B8DBBF9AF45305F50407FB904BB292DF789A098B19
                                                                                              APIs
                                                                                              • OffsetRect.USER32(?,00000001,00000001), ref: 0044D1A9
                                                                                              • GetSysColor.USER32(00000014), ref: 0044D1B0
                                                                                              • SetTextColor.GDI32(00000000,00000000), ref: 0044D1C8
                                                                                              • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D1F1
                                                                                              • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044D1FB
                                                                                              • GetSysColor.USER32(00000010), ref: 0044D202
                                                                                              • SetTextColor.GDI32(00000000,00000000), ref: 0044D21A
                                                                                              • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D243
                                                                                              • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D26E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Text$Color$Draw$OffsetRect
                                                                                              • String ID:
                                                                                              • API String ID: 1005981011-0
                                                                                              • Opcode ID: 32856f07fc45aa5b94f1f38070a47e962b22e9d58654105098b1be26c78061dc
                                                                                              • Instruction ID: 8406a00effd73db105afccad7da3796984cf264811f0ddac3e5cace4e0ac1d2b
                                                                                              • Opcode Fuzzy Hash: 32856f07fc45aa5b94f1f38070a47e962b22e9d58654105098b1be26c78061dc
                                                                                              • Instruction Fuzzy Hash: A021BDB42015047FC710FB2ACD8AE8B6BDCDF19319B05457AB958EB292C67CDD404668
                                                                                              APIs
                                                                                              • GetFocus.USER32 ref: 0041B745
                                                                                              • GetDC.USER32(?), ref: 0041B751
                                                                                              • SelectPalette.GDI32(00000000,?,00000000), ref: 0041B786
                                                                                              • RealizePalette.GDI32(00000000), ref: 0041B792
                                                                                              • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041B7C0
                                                                                              • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041B7F4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Palette$Select$BitmapCreateFocusRealize
                                                                                              • String ID: %H
                                                                                              • API String ID: 3275473261-1959103961
                                                                                              • Opcode ID: 9b17a45ebd00e155e5aeae17ac6cac102e8e00fd56b9a0d3692e3d2bf0971335
                                                                                              • Instruction ID: 38bdddf8d72f5571b31e8017bfcff87152bbfcb95d4f6cd7f9962c0a723fddb9
                                                                                              • Opcode Fuzzy Hash: 9b17a45ebd00e155e5aeae17ac6cac102e8e00fd56b9a0d3692e3d2bf0971335
                                                                                              • Instruction Fuzzy Hash: 8A512F70A002099FDF11DFA9C881AEEBBF9FF49704F104066F504A7791D7799981CBA9
                                                                                              APIs
                                                                                              • GetFocus.USER32 ref: 0041BA17
                                                                                              • GetDC.USER32(?), ref: 0041BA23
                                                                                              • SelectPalette.GDI32(00000000,?,00000000), ref: 0041BA5D
                                                                                              • RealizePalette.GDI32(00000000), ref: 0041BA69
                                                                                              • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BA8D
                                                                                              • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041BAC1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Palette$Select$BitmapCreateFocusRealize
                                                                                              • String ID: %H
                                                                                              • API String ID: 3275473261-1959103961
                                                                                              • Opcode ID: f1b656a7ede54f8d65f93cc35dc493626dae048aef23b352968a277fb398f08e
                                                                                              • Instruction ID: 3fcaffe560058c7771eaec6053d79e0e1924f360d52694d27862de55114c0f48
                                                                                              • Opcode Fuzzy Hash: f1b656a7ede54f8d65f93cc35dc493626dae048aef23b352968a277fb398f08e
                                                                                              • Instruction Fuzzy Hash: 9D512A74A002189FDB11DFA9C891AAEBBF9FF49700F154066F904EB751D738AD40CBA4
                                                                                              APIs
                                                                                                • Part of subcall function 0045092C: SetEndOfFile.KERNEL32(?,?,0045C342,00000000,0045C4CD,?,00000000,00000002,00000002), ref: 00450933
                                                                                                • Part of subcall function 00406F50: DeleteFileA.KERNEL32(00000000,0049B628,004986F1,00000000,00498746,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F5B
                                                                                              • GetWindowThreadProcessId.USER32(00000000,?), ref: 00496585
                                                                                              • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 00496599
                                                                                              • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 004965B3
                                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 004965BF
                                                                                              • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 004965C5
                                                                                              • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 004965D8
                                                                                              Strings
                                                                                              • Deleting Uninstall data files., xrefs: 004964FB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileProcess$CloseDeleteHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
                                                                                              • String ID: Deleting Uninstall data files.
                                                                                              • API String ID: 1570157960-2568741658
                                                                                              • Opcode ID: 8e8cb50e53c2c3b2038bacabf8c777ac21aad5dfe2dc8a8db11d37eec289bdf4
                                                                                              • Instruction ID: caddedc05ae4add9971b90b84c259ce0cd5246952d50e779d54ebc968ffbf915
                                                                                              • Opcode Fuzzy Hash: 8e8cb50e53c2c3b2038bacabf8c777ac21aad5dfe2dc8a8db11d37eec289bdf4
                                                                                              • Instruction Fuzzy Hash: 73216170204250BFEB10EB6ABC82B2637A8DB54728F53453BB501961D6DA7CAC448A6D
                                                                                              APIs
                                                                                                • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                              • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004702F9,?,?,?,?,00000000), ref: 00470263
                                                                                              • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004702F9), ref: 0047027A
                                                                                              • AddFontResourceA.GDI32(00000000), ref: 00470297
                                                                                              • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 004702AB
                                                                                              Strings
                                                                                              • AddFontResource, xrefs: 004702B5
                                                                                              • Failed to set value in Fonts registry key., xrefs: 0047026C
                                                                                              • Failed to open Fonts registry key., xrefs: 00470281
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseFontMessageNotifyOpenResourceSendValue
                                                                                              • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                                                                                              • API String ID: 955540645-649663873
                                                                                              • Opcode ID: f6cb4db48621d05014dac95341ab5faf08594db0be4636be460d29a68d9f0f75
                                                                                              • Instruction ID: 122e39bb1ea2b43e4c2a7da55aa69ddad999e5e54c07bca5f4119535fc7344d3
                                                                                              • Opcode Fuzzy Hash: f6cb4db48621d05014dac95341ab5faf08594db0be4636be460d29a68d9f0f75
                                                                                              • Instruction Fuzzy Hash: 6921E271741204BBDB10EAA68C46FAE67AC9B14704F208477B904EB3C3DA7C9E01866D
                                                                                              APIs
                                                                                                • Part of subcall function 00416410: GetClassInfoA.USER32(00400000,?,?), ref: 0041647F
                                                                                                • Part of subcall function 00416410: UnregisterClassA.USER32(?,00400000), ref: 004164AB
                                                                                                • Part of subcall function 00416410: RegisterClassA.USER32(?), ref: 004164CE
                                                                                              • GetVersion.KERNEL32 ref: 00462E60
                                                                                              • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 00462E9E
                                                                                              • SHGetFileInfo.SHELL32(00462F3C,00000000,?,00000160,00004011), ref: 00462EBB
                                                                                              • LoadCursorA.USER32(00000000,00007F02), ref: 00462ED9
                                                                                              • SetCursor.USER32(00000000,00000000,00007F02,00462F3C,00000000,?,00000160,00004011), ref: 00462EDF
                                                                                              • SetCursor.USER32(?,00462F1F,00007F02,00462F3C,00000000,?,00000160,00004011), ref: 00462F12
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
                                                                                              • String ID: Explorer
                                                                                              • API String ID: 2594429197-512347832
                                                                                              • Opcode ID: 271d5cc6534746d744017855cbe3809792a4a5bc456b5a0a77df68c724b1ffee
                                                                                              • Instruction ID: b0f6820fd5a5ea072646c086af9eca81c98a3cd1ffd9b7ca0f87214cf94a4ba1
                                                                                              • Opcode Fuzzy Hash: 271d5cc6534746d744017855cbe3809792a4a5bc456b5a0a77df68c724b1ffee
                                                                                              • Instruction Fuzzy Hash: CD21E7307403047AEB15BB759D47B9A3798DB09708F4004BFFA05EA1C3EEBD9901966D
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,021F2BD8,?,?,?,021F2BD8,00478534,00000000,00478652,?,?,-00000010,?), ref: 00478389
                                                                                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0047838F
                                                                                              • GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,021F2BD8,?,?,?,021F2BD8,00478534,00000000,00478652,?,?,-00000010,?), ref: 004783A2
                                                                                              • CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,021F2BD8,?,?,?,021F2BD8), ref: 004783CC
                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,021F2BD8,00478534,00000000,00478652,?,?,-00000010,?), ref: 004783EA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileHandle$AddressAttributesCloseCreateModuleProc
                                                                                              • String ID: GetFinalPathNameByHandleA$kernel32.dll
                                                                                              • API String ID: 2704155762-2318956294
                                                                                              • Opcode ID: 606546fc07dcf4a3bd117f62e36919ba8c62e6b487fb6962041f4ee6dba1ecda
                                                                                              • Instruction ID: 2a72e966618face2f1bd82d2a524167157479a72732682c44667b4342ad9b4bf
                                                                                              • Opcode Fuzzy Hash: 606546fc07dcf4a3bd117f62e36919ba8c62e6b487fb6962041f4ee6dba1ecda
                                                                                              • Instruction Fuzzy Hash: 370180A07C070536E520316A4C8AFBB654C8B50769F14863FBA1DFA2D3FDED9D06016E
                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(00000000,00459F8E), ref: 00459ED2
                                                                                                • Part of subcall function 004543F4: FindClose.KERNEL32(000000FF,004544EA), ref: 004544D9
                                                                                              Strings
                                                                                              • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 00459F47
                                                                                              • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 00459EAC
                                                                                              • Deleting directory: %s, xrefs: 00459E5B
                                                                                              • Failed to strip read-only attribute., xrefs: 00459EA0
                                                                                              • Failed to delete directory (%d)., xrefs: 00459F68
                                                                                              • Failed to delete directory (%d). Will retry later., xrefs: 00459EEB
                                                                                              • Stripped read-only attribute., xrefs: 00459E94
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseErrorFindLast
                                                                                              • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                                                                                              • API String ID: 754982922-1448842058
                                                                                              • Opcode ID: 9c44e2e7f6fe757755561f6ca8568e0fef47b87f075e017b2858cb20ebfba709
                                                                                              • Instruction ID: b8d9b7298ea7c3337bda5d500217c07e27fbd6b384233f4239b27a523d6d10d0
                                                                                              • Opcode Fuzzy Hash: 9c44e2e7f6fe757755561f6ca8568e0fef47b87f075e017b2858cb20ebfba709
                                                                                              • Instruction Fuzzy Hash: 1841A331A04208CACB10EB69C8413AEB6A55F4530AF54897BAC01D73D3CB7C8E0DC75E
                                                                                              APIs
                                                                                              • GetCapture.USER32 ref: 00422EA4
                                                                                              • GetCapture.USER32 ref: 00422EB3
                                                                                              • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422EB9
                                                                                              • ReleaseCapture.USER32 ref: 00422EBE
                                                                                              • GetActiveWindow.USER32 ref: 00422ECD
                                                                                              • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00422F4C
                                                                                              • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00422FB0
                                                                                              • GetActiveWindow.USER32 ref: 00422FBF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CaptureMessageSend$ActiveWindow$Release
                                                                                              • String ID:
                                                                                              • API String ID: 862346643-0
                                                                                              • Opcode ID: b1a57ae8c862de22bc82aa702dd5f84040ee9f6a0804fcde46ad074f7f3e30fe
                                                                                              • Instruction ID: c6261992695b47722d84ffa44129b55dc5b2a4dad2f70b0012283783c1c7b094
                                                                                              • Opcode Fuzzy Hash: b1a57ae8c862de22bc82aa702dd5f84040ee9f6a0804fcde46ad074f7f3e30fe
                                                                                              • Instruction Fuzzy Hash: 24417230B00245AFDB10EB69DA86B9E77F1EF44304F5540BAF404AB2A2D778AE40DB49
                                                                                              APIs
                                                                                              • GetWindowLongA.USER32(?,000000F0), ref: 0042F2BA
                                                                                              • GetWindowLongA.USER32(?,000000EC), ref: 0042F2D1
                                                                                              • GetActiveWindow.USER32 ref: 0042F2DA
                                                                                              • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 0042F307
                                                                                              • SetActiveWindow.USER32(?,0042F437,00000000,?), ref: 0042F328
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$ActiveLong$Message
                                                                                              • String ID:
                                                                                              • API String ID: 2785966331-0
                                                                                              • Opcode ID: 267c9eefe26e23fd4e765c6349420bb8bb9da3d18075eb1d96a464b655a4fe2f
                                                                                              • Instruction ID: ac844ef734d24c76dc9aa96f201b13a865b129e9c1b137beabd8cb6517960092
                                                                                              • Opcode Fuzzy Hash: 267c9eefe26e23fd4e765c6349420bb8bb9da3d18075eb1d96a464b655a4fe2f
                                                                                              • Instruction Fuzzy Hash: F931D271A00254AFEB01EFA5DD52E6EBBB8EB09304F9144BAF804E3291D73C9D10CB58
                                                                                              APIs
                                                                                              • GetDC.USER32(00000000), ref: 0042948A
                                                                                              • GetTextMetricsA.GDI32(00000000), ref: 00429493
                                                                                                • Part of subcall function 0041A1E8: CreateFontIndirectA.GDI32(?), ref: 0041A2A7
                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 004294A2
                                                                                              • GetTextMetricsA.GDI32(00000000,?), ref: 004294AF
                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 004294B6
                                                                                              • ReleaseDC.USER32(00000000,00000000), ref: 004294BE
                                                                                              • GetSystemMetrics.USER32(00000006), ref: 004294E3
                                                                                              • GetSystemMetrics.USER32(00000006), ref: 004294FD
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Metrics$ObjectSelectSystemText$CreateFontIndirectRelease
                                                                                              • String ID:
                                                                                              • API String ID: 1583807278-0
                                                                                              • Opcode ID: 960ca5b6b9ec06081429caf0e2ae16fd4423d047ce8cb1d090ce01a2b2c84894
                                                                                              • Instruction ID: 8a5b62ad3b2811282b00f4aa11bc4c2c065e9b9ae855548013837f5c18493421
                                                                                              • Opcode Fuzzy Hash: 960ca5b6b9ec06081429caf0e2ae16fd4423d047ce8cb1d090ce01a2b2c84894
                                                                                              • Instruction Fuzzy Hash: 0F01C4A17087103BE321767A9CC6F6F65C8DB44358F84043BF686D63D3D96C9C41866A
                                                                                              APIs
                                                                                              • GetDC.USER32(00000000), ref: 0041DE27
                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041DE31
                                                                                              • ReleaseDC.USER32(00000000,00000000), ref: 0041DE3E
                                                                                              • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041DE4D
                                                                                              • GetStockObject.GDI32(00000007), ref: 0041DE5B
                                                                                              • GetStockObject.GDI32(00000005), ref: 0041DE67
                                                                                              • GetStockObject.GDI32(0000000D), ref: 0041DE73
                                                                                              • LoadIconA.USER32(00000000,00007F00), ref: 0041DE84
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ObjectStock$CapsDeviceIconLoadRelease
                                                                                              • String ID:
                                                                                              • API String ID: 225703358-0
                                                                                              • Opcode ID: 93123cf7b7da28845296a778695a34f9ae7968dfa7e72d2685fd09fde09bf652
                                                                                              • Instruction ID: 282f56568f1177e4dad385ec7f61a974d29090d827cf1f87eb40c920fa9ca7e8
                                                                                              • Opcode Fuzzy Hash: 93123cf7b7da28845296a778695a34f9ae7968dfa7e72d2685fd09fde09bf652
                                                                                              • Instruction Fuzzy Hash: 4C1142706457015EE340BFA66E52B6A36A4D725708F40413FF609AF3D1D77A2C448B9E
                                                                                              APIs
                                                                                              • LoadCursorA.USER32(00000000,00007F02), ref: 00463344
                                                                                              • SetCursor.USER32(00000000,00000000,00007F02,00000000,004633D9), ref: 0046334A
                                                                                              • SetCursor.USER32(?,004633C1,00007F02,00000000,004633D9), ref: 004633B4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Cursor$Load
                                                                                              • String ID: $ $Internal error: Item already expanding
                                                                                              • API String ID: 1675784387-1948079669
                                                                                              • Opcode ID: 040729a671edf880b94918ceea5f8eaec20fdfbf8da854279a56862745118dff
                                                                                              • Instruction ID: e4e85f4aa3fa623d7d3a169fbc538aa22306e9421cedfdc69a3031d12d347dae
                                                                                              • Opcode Fuzzy Hash: 040729a671edf880b94918ceea5f8eaec20fdfbf8da854279a56862745118dff
                                                                                              • Instruction Fuzzy Hash: 4CB18270604284EFDB11DF29C545B9ABBF1BF04305F1484AAE8469B792DB78EE44CB4A
                                                                                              APIs
                                                                                              • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E17
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: PrivateProfileStringWrite
                                                                                              • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]
                                                                                              • API String ID: 390214022-3304407042
                                                                                              • Opcode ID: 262666494607197906d7283235c4c76affd32b2b0fdb9ef9cba9b9ea75353bac
                                                                                              • Instruction ID: 4c4b1d7f09994941c57eaafc4db68242d6a3f6c21ecd3f2b5b8f846a746055a2
                                                                                              • Opcode Fuzzy Hash: 262666494607197906d7283235c4c76affd32b2b0fdb9ef9cba9b9ea75353bac
                                                                                              • Instruction Fuzzy Hash: 40911434E002099BDB01EFA5D842BDEB7F5AF4874AF608466E90077392D7786E49CB58
                                                                                              APIs
                                                                                              • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 00476CA9
                                                                                              • SetWindowLongW.USER32(00000000,000000FC,00476C04), ref: 00476CD0
                                                                                              • GetACP.KERNEL32(00000000,00476EE8,?,00000000,00476F12), ref: 00476D0D
                                                                                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00476D53
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClassInfoLongMessageSendWindow
                                                                                              • String ID: COMBOBOX$Inno Setup: Language
                                                                                              • API String ID: 3391662889-4234151509
                                                                                              • Opcode ID: 1db359e320ab2741222256d54ad499686456584f5ec697b8868a090b3fdd66eb
                                                                                              • Instruction ID: b13fa11fcbd9abdf7db93726dac51e4442bd67f198c8610d2c1064f44be53319
                                                                                              • Opcode Fuzzy Hash: 1db359e320ab2741222256d54ad499686456584f5ec697b8868a090b3fdd66eb
                                                                                              • Instruction Fuzzy Hash: 46812C346006059FDB10DF69D985AEAB7F2FB09304F15C1BAE808EB762D778AD41CB58
                                                                                              APIs
                                                                                              • GetSystemDefaultLCID.KERNEL32(00000000,00408968,?,?,?,?,00000000,00000000,00000000,?,0040996F,00000000,00409982), ref: 0040873A
                                                                                                • Part of subcall function 00408568: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,00408633,?,00000000,00408712), ref: 00408586
                                                                                                • Part of subcall function 004085B4: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004087B6,?,?,?,00000000,00408968), ref: 004085C7
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: InfoLocale$DefaultSystem
                                                                                              • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                                              • API String ID: 1044490935-665933166
                                                                                              • Opcode ID: 99a58aab46255149f4b24f4520dbd6929c7443738739b227c4cc8c7d24f61a81
                                                                                              • Instruction ID: 5c6fde8006682913ecab3173e7335377554a92ac61a87523d81808753b4ec1a9
                                                                                              • Opcode Fuzzy Hash: 99a58aab46255149f4b24f4520dbd6929c7443738739b227c4cc8c7d24f61a81
                                                                                              • Instruction Fuzzy Hash: 7D516C24B00108ABDB01FBA69E4169EB7A9DB94308F50C07FA181BB3C3CE3DDA05975D
                                                                                              APIs
                                                                                              • GetVersion.KERNEL32(00000000,004118F9), ref: 0041178C
                                                                                              • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 0041184A
                                                                                                • Part of subcall function 00411AAC: CreatePopupMenu.USER32 ref: 00411AC6
                                                                                              • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 004118D6
                                                                                                • Part of subcall function 00411AAC: CreateMenu.USER32 ref: 00411AD0
                                                                                              • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 004118BD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$Insert$Create$ItemPopupVersion
                                                                                              • String ID: ,$?
                                                                                              • API String ID: 2359071979-2308483597
                                                                                              • Opcode ID: 4986dcd06abefbee5f666d79fc26290c702fe8a84b14e195092edf3558bd7871
                                                                                              • Instruction ID: ecf66c9774bccec907b621c371347452b74b7622051e058d8a4a73451c3e974f
                                                                                              • Opcode Fuzzy Hash: 4986dcd06abefbee5f666d79fc26290c702fe8a84b14e195092edf3558bd7871
                                                                                              • Instruction Fuzzy Hash: D7510674A00245ABDB10EF6ADC816EA7BF9AF09304B11857BF904E73A6D738DD41CB58
                                                                                              APIs
                                                                                              • GetObjectA.GDI32(?,00000018,?), ref: 0041BF28
                                                                                              • GetObjectA.GDI32(?,00000018,?), ref: 0041BF37
                                                                                              • GetBitmapBits.GDI32(?,?,?), ref: 0041BF88
                                                                                              • GetBitmapBits.GDI32(?,?,?), ref: 0041BF96
                                                                                              • DeleteObject.GDI32(?), ref: 0041BF9F
                                                                                              • DeleteObject.GDI32(?), ref: 0041BFA8
                                                                                              • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041BFC5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Object$BitmapBitsDelete$CreateIcon
                                                                                              • String ID:
                                                                                              • API String ID: 1030595962-0
                                                                                              • Opcode ID: dabea464bc85c36b4411cc83672e19ff5768c85fc4c65aec36842f1966395034
                                                                                              • Instruction ID: 74cae3b7aa7aab4ce12a2fbd062d204c5c4082198076ec6df892ad84fd278e80
                                                                                              • Opcode Fuzzy Hash: dabea464bc85c36b4411cc83672e19ff5768c85fc4c65aec36842f1966395034
                                                                                              • Instruction Fuzzy Hash: 6A510671A002199FCB10DFA9C9819EEB7F9EF48314B11416AF914E7395D738AD41CB68
                                                                                              APIs
                                                                                              • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041CEFE
                                                                                              • GetDeviceCaps.GDI32(00000000,00000026), ref: 0041CF1D
                                                                                              • SelectPalette.GDI32(?,?,00000001), ref: 0041CF83
                                                                                              • RealizePalette.GDI32(?), ref: 0041CF92
                                                                                              • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041CFFC
                                                                                              • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041D03A
                                                                                              • SelectPalette.GDI32(?,?,00000001), ref: 0041D05F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: PaletteStretch$Select$BitsCapsDeviceModeRealize
                                                                                              • String ID:
                                                                                              • API String ID: 2222416421-0
                                                                                              • Opcode ID: 5be0e4e6833feb243a8d388dd1011de92277052336d3d318ec39d49e9b6efc72
                                                                                              • Instruction ID: 4b814cf558339e083a7fb5ccd56fb4ffad9fd0a27a4bfdacf16c2dd2476febac
                                                                                              • Opcode Fuzzy Hash: 5be0e4e6833feb243a8d388dd1011de92277052336d3d318ec39d49e9b6efc72
                                                                                              • Instruction Fuzzy Hash: D2515EB0604200AFDB14DFA8C985F9BBBE9EF08304F10459AB549DB292C778ED81CB58
                                                                                              APIs
                                                                                              • SendMessageA.USER32(00000000,?,?), ref: 0045732E
                                                                                                • Part of subcall function 0042427C: GetWindowTextA.USER32(?,?,00000100), ref: 0042429C
                                                                                                • Part of subcall function 0041EEA4: GetCurrentThreadId.KERNEL32 ref: 0041EEF3
                                                                                                • Part of subcall function 0041EEA4: EnumThreadWindows.USER32(00000000,0041EE54,00000000), ref: 0041EEF9
                                                                                                • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
                                                                                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00457395
                                                                                              • TranslateMessage.USER32(?), ref: 004573B3
                                                                                              • DispatchMessageA.USER32(?), ref: 004573BC
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Message$TextThreadWindow$CurrentDispatchEnumSendTranslateWindows
                                                                                              • String ID: [Paused]
                                                                                              • API String ID: 1007367021-4230553315
                                                                                              • Opcode ID: 138259db96aaba9c66cb09bcf6582550d327018b684ee04c4d651f5f89e9d65e
                                                                                              • Instruction ID: a72840e20965590be0df7748d4dcd1bfe023db3bc5775872eefead19b10ec59e
                                                                                              • Opcode Fuzzy Hash: 138259db96aaba9c66cb09bcf6582550d327018b684ee04c4d651f5f89e9d65e
                                                                                              • Instruction Fuzzy Hash: 633175319082449ADB11DBB9EC81B9E7FB8EF49314F5540B7EC00E7292D73C9909DB69
                                                                                              APIs
                                                                                              • GetCursor.USER32(00000000,0046B55F), ref: 0046B4DC
                                                                                              • LoadCursorA.USER32(00000000,00007F02), ref: 0046B4EA
                                                                                              • SetCursor.USER32(00000000,00000000,00007F02,00000000,0046B55F), ref: 0046B4F0
                                                                                              • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,0046B55F), ref: 0046B4FA
                                                                                              • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,0046B55F), ref: 0046B500
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Cursor$LoadSleep
                                                                                              • String ID: CheckPassword
                                                                                              • API String ID: 4023313301-1302249611
                                                                                              • Opcode ID: 301d54e166a0b4011b0937e4b70ed1e1b4ade500f65d2603abaf2adc357acc1d
                                                                                              • Instruction ID: 9465d4cba05e43c3341d6d018928b45656d3fee3f016636846a90655da25d4f4
                                                                                              • Opcode Fuzzy Hash: 301d54e166a0b4011b0937e4b70ed1e1b4ade500f65d2603abaf2adc357acc1d
                                                                                              • Instruction Fuzzy Hash: D0316334740204AFD711EF69C899B9A7BE4EF45308F5580B6F9049B3A2D7789E40CB99
                                                                                              APIs
                                                                                                • Part of subcall function 00477B94: GetWindowThreadProcessId.USER32(00000000), ref: 00477B9C
                                                                                                • Part of subcall function 00477B94: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477C93,0049C0A8,00000000), ref: 00477BAF
                                                                                                • Part of subcall function 00477B94: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477BB5
                                                                                              • SendMessageA.USER32(00000000,0000004A,00000000,00478026), ref: 00477CA1
                                                                                              • GetTickCount.KERNEL32 ref: 00477CE6
                                                                                              • GetTickCount.KERNEL32 ref: 00477CF0
                                                                                              • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 00477D45
                                                                                              Strings
                                                                                              • CallSpawnServer: Unexpected status: %d, xrefs: 00477D2E
                                                                                              • CallSpawnServer: Unexpected response: $%x, xrefs: 00477CD6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CountTick$AddressHandleMessageModuleMultipleObjectsProcProcessSendThreadWaitWindow
                                                                                              • String ID: CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d
                                                                                              • API String ID: 613034392-3771334282
                                                                                              • Opcode ID: a349fc6668a2a279a7709dc0d92d626649643492524c5ed72309cd5f58a9f2ee
                                                                                              • Instruction ID: 262cbc5b9954910938d5a1e8e32dc50db46ad6f301169d9d39307b56b522dac3
                                                                                              • Opcode Fuzzy Hash: a349fc6668a2a279a7709dc0d92d626649643492524c5ed72309cd5f58a9f2ee
                                                                                              • Instruction Fuzzy Hash: 87318474B042159EDB10EBB9C8867EE76A0AF08714F90807AB548EB392D67C9D4187AD
                                                                                              APIs
                                                                                              • GetProcAddress.KERNEL32(?,CreateAssemblyCache), ref: 0045983F
                                                                                              Strings
                                                                                              • Failed to get address of .NET Framework CreateAssemblyCache function, xrefs: 0045984A
                                                                                              • Fusion.dll, xrefs: 004597DF
                                                                                              • Failed to load .NET Framework DLL "%s", xrefs: 00459824
                                                                                              • CreateAssemblyCache, xrefs: 00459836
                                                                                              • .NET Framework CreateAssemblyCache function failed, xrefs: 00459862
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc
                                                                                              • String ID: .NET Framework CreateAssemblyCache function failed$CreateAssemblyCache$Failed to get address of .NET Framework CreateAssemblyCache function$Failed to load .NET Framework DLL "%s"$Fusion.dll
                                                                                              • API String ID: 190572456-3990135632
                                                                                              • Opcode ID: 64b7f7115ec2050a4f0e42ab113808549d669c8acfba7d9bf3bad921683fe547
                                                                                              • Instruction ID: 9a538673283cb431493768ab67eac729fe35d93f11f945e2dcd414e2b3f175b6
                                                                                              • Opcode Fuzzy Hash: 64b7f7115ec2050a4f0e42ab113808549d669c8acfba7d9bf3bad921683fe547
                                                                                              • Instruction Fuzzy Hash: A2318B70E10649ABCB10FFA5C88169EB7B8EF45315F50857BE814E7382DB389E08C799
                                                                                              APIs
                                                                                                • Part of subcall function 0041C048: GetObjectA.GDI32(?,00000018), ref: 0041C055
                                                                                              • GetFocus.USER32 ref: 0041C168
                                                                                              • GetDC.USER32(?), ref: 0041C174
                                                                                              • SelectPalette.GDI32(?,?,00000000), ref: 0041C195
                                                                                              • RealizePalette.GDI32(?), ref: 0041C1A1
                                                                                              • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C1B8
                                                                                              • SelectPalette.GDI32(?,00000000,00000000), ref: 0041C1E0
                                                                                              • ReleaseDC.USER32(?,?), ref: 0041C1ED
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Palette$Select$BitsFocusObjectRealizeRelease
                                                                                              • String ID:
                                                                                              • API String ID: 3303097818-0
                                                                                              • Opcode ID: 26117fda3ddcda01a6cc84f42a4f6ec069d0e010bd6cdd98afb854c6c7779a8d
                                                                                              • Instruction ID: 25a0b6576c779426e59073023ceed4ef49f3845c1b310514cd4f08ef327de147
                                                                                              • Opcode Fuzzy Hash: 26117fda3ddcda01a6cc84f42a4f6ec069d0e010bd6cdd98afb854c6c7779a8d
                                                                                              • Instruction Fuzzy Hash: 49116D71A44604BFDF10DBE9CC81FAFB7FCEB48700F50486AB518E7281DA7899008B28
                                                                                              APIs
                                                                                              • GetSystemMetrics.USER32(0000000E), ref: 00418C70
                                                                                              • GetSystemMetrics.USER32(0000000D), ref: 00418C78
                                                                                              • 6FC92980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418C7E
                                                                                                • Part of subcall function 004107F8: 6FC8C400.COMCTL32(0049B628,000000FF,00000000,00418CAC,00000000,00418D08,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 004107FC
                                                                                              • 6FCFCB00.COMCTL32(0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418CCE
                                                                                              • 6FCFC740.COMCTL32(00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00418CD9
                                                                                              • 6FCFCB00.COMCTL32(0049B628,00000001,?,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000), ref: 00418CEC
                                                                                              • 6FC90860.COMCTL32(0049B628,00418D0F,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000,0000000E), ref: 00418D02
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: MetricsSystem$C400C740C90860C92980
                                                                                              • String ID:
                                                                                              • API String ID: 992039177-0
                                                                                              • Opcode ID: e2c7fe5230f8d2f143d47c0d6a7892a097693e1c100db4317caf46c6149257f7
                                                                                              • Instruction ID: f48c8f8e6a400555c090207229051c9eae11b8a9b20c4da93df477ea8fa1a9e8
                                                                                              • Opcode Fuzzy Hash: e2c7fe5230f8d2f143d47c0d6a7892a097693e1c100db4317caf46c6149257f7
                                                                                              • Instruction Fuzzy Hash: 6B112475744204BBDB50EBA9EC82FAD73F8DB08704F504066B514EB2C1DAB9AD808759
                                                                                              APIs
                                                                                                • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                              • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,00483D24), ref: 00483D09
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseOpen
                                                                                              • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                                                                              • API String ID: 47109696-2530820420
                                                                                              • Opcode ID: e1bcbbbaaee85d585434023fd650e6813b785c41e8fbc068ac73575afb55ee56
                                                                                              • Instruction ID: 212569cff1cfb7858b589fbdbabdc9c693f1f7cc945fcf11155ec0ddb5f1f406
                                                                                              • Opcode Fuzzy Hash: e1bcbbbaaee85d585434023fd650e6813b785c41e8fbc068ac73575afb55ee56
                                                                                              • Instruction Fuzzy Hash: CC117C30704244AADB10FF65D862B5E7BF9DB45B05F618877A800E7282EB78AE05875C
                                                                                              APIs
                                                                                              • SelectObject.GDI32(00000000,?), ref: 0041B470
                                                                                              • SelectObject.GDI32(?,00000000), ref: 0041B47F
                                                                                              • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4AB
                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 0041B4B9
                                                                                              • SelectObject.GDI32(?,00000000), ref: 0041B4C7
                                                                                              • DeleteDC.GDI32(00000000), ref: 0041B4D0
                                                                                              • DeleteDC.GDI32(?), ref: 0041B4D9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ObjectSelect$Delete$Stretch
                                                                                              • String ID:
                                                                                              • API String ID: 1458357782-0
                                                                                              • Opcode ID: 8542cbb8adbe0fd8af4a730cfe3faeef428ae57c020086fb9cb954466ea4b08d
                                                                                              • Instruction ID: 052e9154069abc57648b404522aaf552eddfcc6d95cd3388d63b7ef9ce004286
                                                                                              • Opcode Fuzzy Hash: 8542cbb8adbe0fd8af4a730cfe3faeef428ae57c020086fb9cb954466ea4b08d
                                                                                              • Instruction Fuzzy Hash: 7B115C72E40619ABDB10DAD9DC86FEFB7BCEF08704F144555B614F7282C678AC418BA8
                                                                                              APIs
                                                                                              • GetDC.USER32(00000000), ref: 00495519
                                                                                                • Part of subcall function 0041A1E8: CreateFontIndirectA.GDI32(?), ref: 0041A2A7
                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 0049553B
                                                                                              • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,00495AB9), ref: 0049554F
                                                                                              • GetTextMetricsA.GDI32(00000000,?), ref: 00495571
                                                                                              • ReleaseDC.USER32(00000000,00000000), ref: 0049558E
                                                                                              Strings
                                                                                              • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00495546
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Text$CreateExtentFontIndirectMetricsObjectPointReleaseSelect
                                                                                              • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                                                                              • API String ID: 2948443157-222967699
                                                                                              • Opcode ID: 15e89f7ca813e7522845c960856b2cdc022ede195b48aa860a28df6e22a0f939
                                                                                              • Instruction ID: fbfe8d588f566b1ae935688c8d8bbf43f3780a3d17a9f30f48774e54417b88ea
                                                                                              • Opcode Fuzzy Hash: 15e89f7ca813e7522845c960856b2cdc022ede195b48aa860a28df6e22a0f939
                                                                                              • Instruction Fuzzy Hash: 98018476A04704BFEB05DBE9CC41E5EB7EDEB48714F614476F604E7281D678AE008B28
                                                                                              APIs
                                                                                              • GetCursorPos.USER32 ref: 004233AF
                                                                                              • WindowFromPoint.USER32(?,?), ref: 004233BC
                                                                                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004233CA
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 004233D1
                                                                                              • SendMessageA.USER32(00000000,00000084,?,?), ref: 004233EA
                                                                                              • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00423401
                                                                                              • SetCursor.USER32(00000000), ref: 00423413
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                                                                              • String ID:
                                                                                              • API String ID: 1770779139-0
                                                                                              • Opcode ID: 134875e674979cd567c136abb418dc525a6250aa5b529fa10794d0eebf3240cc
                                                                                              • Instruction ID: 22bb490dc700fc35bbf8fe9eba0271ced42fa0644d0760cf779c582944844a3d
                                                                                              • Opcode Fuzzy Hash: 134875e674979cd567c136abb418dc525a6250aa5b529fa10794d0eebf3240cc
                                                                                              • Instruction Fuzzy Hash: BA01D4223046103AD6217B755D82E2F26E8DB85B15F50407FF504BB283DA3D9D11937D
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(user32.dll), ref: 0049533C
                                                                                              • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 00495349
                                                                                              • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00495356
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$HandleModule
                                                                                              • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                                                                                              • API String ID: 667068680-2254406584
                                                                                              • Opcode ID: 5579b8dc187442e7c517f6558358e9e0fd6dcc5405420102cd7b083255a2d8af
                                                                                              • Instruction ID: d6622564654ba01390171a2dbbf88ec7785202fdd48675fe733a6c53722864ad
                                                                                              • Opcode Fuzzy Hash: 5579b8dc187442e7c517f6558358e9e0fd6dcc5405420102cd7b083255a2d8af
                                                                                              • Instruction Fuzzy Hash: 7EF0F692741F156ADA3121660C41B7F6B8CCB917B1F240137BE44A7382E9ED8C0047ED
                                                                                              APIs
                                                                                              • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressInit), ref: 0045D691
                                                                                              • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompress), ref: 0045D6A1
                                                                                              • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressEnd), ref: 0045D6B1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc
                                                                                              • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                                                                                              • API String ID: 190572456-212574377
                                                                                              • Opcode ID: 0c00d940adfee3eed657d73ca32928dd6beaef8d72542be6af97d79d08c28db7
                                                                                              • Instruction ID: 26f5c6c79611f6cc0facecefa5b4932716cc5d8e9f8ea2477ead0514974f6e87
                                                                                              • Opcode Fuzzy Hash: 0c00d940adfee3eed657d73ca32928dd6beaef8d72542be6af97d79d08c28db7
                                                                                              • Instruction Fuzzy Hash: 0EF01DB0D00705DFD724EFB6ACC672736D5AB6831AF50813B990E95262D778045ACF2C
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilterEx,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002,00000000,004812C8), ref: 0042EA35
                                                                                              • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EA3B
                                                                                              • InterlockedExchange.KERNEL32(0049B668,00000001), ref: 0042EA4C
                                                                                                • Part of subcall function 0042E9AC: GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA70,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9C2
                                                                                                • Part of subcall function 0042E9AC: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9C8
                                                                                                • Part of subcall function 0042E9AC: InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9D9
                                                                                              • ChangeWindowMessageFilterEx.USER32(00000000,?,00000001,00000000,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042EA60
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressExchangeHandleInterlockedModuleProc$ChangeFilterMessageWindow
                                                                                              • String ID: ChangeWindowMessageFilterEx$user32.dll
                                                                                              • API String ID: 142928637-2676053874
                                                                                              • Opcode ID: 2e6935975283b392abf6eb535232e6e33c7297ce4864da2c850d0b2669d54df9
                                                                                              • Instruction ID: 20967f7a279d57b19857f2ad39d34e10c6be6de8430a8d3efc5b40b14e24a4c3
                                                                                              • Opcode Fuzzy Hash: 2e6935975283b392abf6eb535232e6e33c7297ce4864da2c850d0b2669d54df9
                                                                                              • Instruction Fuzzy Hash: 99E092A1741B20EAEA10B7B67C86FAA2658EB1076DF500037F100A51F1C3BD1C80CE9E
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(oleacc.dll,?,0044F089), ref: 0044C7EB
                                                                                              • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044C7FC
                                                                                              • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044C80C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$LibraryLoad
                                                                                              • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                                                                                              • API String ID: 2238633743-1050967733
                                                                                              • Opcode ID: 580db4225bb49e0f2395934ae602c4dd6ca827d8c76c18c7318a842ee4a54372
                                                                                              • Instruction ID: d6497c9818d993b67a5702c7731996643d684f189bbd4b702b1f6e54e13363b7
                                                                                              • Opcode Fuzzy Hash: 580db4225bb49e0f2395934ae602c4dd6ca827d8c76c18c7318a842ee4a54372
                                                                                              • Instruction Fuzzy Hash: 50F0DA70282305CAE750BBB5FDD57263694E3A470AF18277BE841551A2C7B94844CB8C
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,?,00498C24), ref: 00478C26
                                                                                              • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478C33
                                                                                              • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478C43
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$HandleModule
                                                                                              • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
                                                                                              • API String ID: 667068680-222143506
                                                                                              • Opcode ID: 81267d710db967c56e7e702a34d1e8b60bf08845a808e06a5f27e56110be3c01
                                                                                              • Instruction ID: 32a0137ea675787c0bb1f7a77b9c903aea73f6d33f3aa717a8ad139b0a70eb03
                                                                                              • Opcode Fuzzy Hash: 81267d710db967c56e7e702a34d1e8b60bf08845a808e06a5f27e56110be3c01
                                                                                              • Instruction Fuzzy Hash: 4DC0C9F02C1700EEAA01B7B11DCAA7A255CC500728320843F7049BA182D97C0C104F3C
                                                                                              APIs
                                                                                              • GetFocus.USER32 ref: 0041B57E
                                                                                              • GetDC.USER32(?), ref: 0041B58A
                                                                                              • GetDeviceCaps.GDI32(?,00000068), ref: 0041B5A6
                                                                                              • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041B5C3
                                                                                              • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041B5DA
                                                                                              • ReleaseDC.USER32(?,?), ref: 0041B626
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: EntriesPaletteSystem$CapsDeviceFocusRelease
                                                                                              • String ID:
                                                                                              • API String ID: 2502006586-0
                                                                                              • Opcode ID: e956e6ae92597662ed98b2f51c6b506043ab8b509e5ceb21f610fa5f8f95298e
                                                                                              • Instruction ID: 1753bd22f5710d4f749a3cf2d8329d0f84e6490acb09e3fae29671003709e3a5
                                                                                              • Opcode Fuzzy Hash: e956e6ae92597662ed98b2f51c6b506043ab8b509e5ceb21f610fa5f8f95298e
                                                                                              • Instruction Fuzzy Hash: D0410631A04258AFDF10DFA9C885AAFBBB4EF59704F1484AAF500EB351D3389D51CBA5
                                                                                              APIs
                                                                                              • SetLastError.KERNEL32(00000057,00000000,0045D118,?,?,?,?,00000000), ref: 0045D0B7
                                                                                              • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045D184,?,00000000,0045D118,?,?,?,?,00000000), ref: 0045D0F6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast
                                                                                              • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
                                                                                              • API String ID: 1452528299-1580325520
                                                                                              • Opcode ID: 44daac30ba6290961f85a10f910adeebe56024b8db7d764ffa7b36a0de599fb3
                                                                                              • Instruction ID: 81e1e27ad3ae8d1ea1d6b81b4c13ff0be47bc54c17845d393ef4ad8e2f10c1e8
                                                                                              • Opcode Fuzzy Hash: 44daac30ba6290961f85a10f910adeebe56024b8db7d764ffa7b36a0de599fb3
                                                                                              • Instruction Fuzzy Hash: 2C117535A04608AFD731DA91C942B9EB6ADDF4470AF6040776D00572C3D67C5F0B992E
                                                                                              APIs
                                                                                              • GetSystemMetrics.USER32(0000000B), ref: 0041BDD5
                                                                                              • GetSystemMetrics.USER32(0000000C), ref: 0041BDDF
                                                                                              • GetDC.USER32(00000000), ref: 0041BDE9
                                                                                              • GetDeviceCaps.GDI32(00000000,0000000E), ref: 0041BE10
                                                                                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0041BE1D
                                                                                              • ReleaseDC.USER32(00000000,00000000), ref: 0041BE56
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CapsDeviceMetricsSystem$Release
                                                                                              • String ID:
                                                                                              • API String ID: 447804332-0
                                                                                              • Opcode ID: 3bdc6123dd6674b0137b7fef1a93c0b96d54f33e4692062cf67464f69f8f60e7
                                                                                              • Instruction ID: d5b995c8e3894394b735eabd433659eae54025482fea58e306a85006fdca5b97
                                                                                              • Opcode Fuzzy Hash: 3bdc6123dd6674b0137b7fef1a93c0b96d54f33e4692062cf67464f69f8f60e7
                                                                                              • Instruction Fuzzy Hash: E5212A74E04648AFEB00EFA9C941BEEB7B4EB48714F10846AF514B7690D7785940CB69
                                                                                              APIs
                                                                                              • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,00401B68), ref: 00401ABD
                                                                                              • LocalFree.KERNEL32(0064F2A8,00000000,00401B68), ref: 00401ACF
                                                                                              • VirtualFree.KERNEL32(?,00000000,00008000,0064F2A8,00000000,00401B68), ref: 00401AEE
                                                                                              • LocalFree.KERNEL32(006502A8,?,00000000,00008000,0064F2A8,00000000,00401B68), ref: 00401B2D
                                                                                              • RtlLeaveCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B58
                                                                                              • RtlDeleteCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B62
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                                              • String ID:
                                                                                              • API String ID: 3782394904-0
                                                                                              • Opcode ID: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                                                                                              • Instruction ID: 79795942c165c44483fb09e1962e32eaca51f8de38df00e9c029d8aa05623ce8
                                                                                              • Opcode Fuzzy Hash: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                                                                                              • Instruction Fuzzy Hash: 3B118E30A003405AEB15AB65BE85B263BA5D761B08F44407BF80067BF3D77C5850E7AE
                                                                                              APIs
                                                                                              • GetWindowLongA.USER32(?,000000EC), ref: 0047E766
                                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,0046CD49), ref: 0047E78C
                                                                                              • GetWindowLongA.USER32(?,000000EC), ref: 0047E79C
                                                                                              • SetWindowLongA.USER32(?,000000EC,00000000), ref: 0047E7BD
                                                                                              • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 0047E7D1
                                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 0047E7ED
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Long$Show
                                                                                              • String ID:
                                                                                              • API String ID: 3609083571-0
                                                                                              • Opcode ID: ff63fb1e20feffedf8b27b7393a281f73df7108790e31fa3444cbd3f3be65d10
                                                                                              • Instruction ID: 463a5c2536fff799c7bf7cf61cbf8045bc8b98cac2b0bb45a0840e8ed8c25010
                                                                                              • Opcode Fuzzy Hash: ff63fb1e20feffedf8b27b7393a281f73df7108790e31fa3444cbd3f3be65d10
                                                                                              • Instruction Fuzzy Hash: 53010CB5641210ABEA00D769DE81F6637D8AB1C320F0943A6B959DF3E3C738EC408B49
                                                                                              APIs
                                                                                                • Part of subcall function 0041A6E0: CreateBrushIndirect.GDI32 ref: 0041A74B
                                                                                              • UnrealizeObject.GDI32(00000000), ref: 0041B27C
                                                                                              • SelectObject.GDI32(?,00000000), ref: 0041B28E
                                                                                              • SetBkColor.GDI32(?,00000000), ref: 0041B2B1
                                                                                              • SetBkMode.GDI32(?,00000002), ref: 0041B2BC
                                                                                              • SetBkColor.GDI32(?,00000000), ref: 0041B2D7
                                                                                              • SetBkMode.GDI32(?,00000001), ref: 0041B2E2
                                                                                                • Part of subcall function 0041A058: GetSysColor.USER32(?), ref: 0041A062
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                                                                              • String ID:
                                                                                              • API String ID: 3527656728-0
                                                                                              • Opcode ID: 90af7722afa79acc590a6ee3060039fb524340e2cf7ce152cccbdcb584e8dbde
                                                                                              • Instruction ID: d03b18a2b949c207061bd18b8e5d47ed8ce294e6be165222704fda36eef26a4f
                                                                                              • Opcode Fuzzy Hash: 90af7722afa79acc590a6ee3060039fb524340e2cf7ce152cccbdcb584e8dbde
                                                                                              • Instruction Fuzzy Hash: 56F0CD756015009BDE00FFAAD9CBE4B3B989F043097048496B908DF187CA3CD8649B3A
                                                                                              APIs
                                                                                              • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,!nI,_iu,?,00000000,004539F6), ref: 004539AB
                                                                                              • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,!nI,_iu,?,00000000,004539F6), ref: 004539BB
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseCreateFileHandle
                                                                                              • String ID: !nI$.tmp$_iu
                                                                                              • API String ID: 3498533004-584216493
                                                                                              • Opcode ID: 1dee75e2bfc2da78c26475f080e8b0a4db6a1a73d39b0bf1d20dabbe4352c150
                                                                                              • Instruction ID: 7da7e9bbb2667b7856572ae533a3071efe8e017fb0344d9459fa270775feb22d
                                                                                              • Opcode Fuzzy Hash: 1dee75e2bfc2da78c26475f080e8b0a4db6a1a73d39b0bf1d20dabbe4352c150
                                                                                              • Instruction Fuzzy Hash: 1831C5B0A00249ABCB11EF95D842B9EBBB4AF44345F20453AF810B73C2D7785F058B69
                                                                                              APIs
                                                                                                • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
                                                                                              • ShowWindow.USER32(?,00000005,00000000,00497FC1,?,?,00000000), ref: 00497D92
                                                                                                • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                                                                • Part of subcall function 004072A8: SetCurrentDirectoryA.KERNEL32(00000000,?,00497DBA,00000000,00497F8D,?,?,00000005,00000000,00497FC1,?,?,00000000), ref: 004072B3
                                                                                                • Part of subcall function 0042D44C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4DA,?,?,?,00000001,?,0045607E,00000000,004560E6), ref: 0042D481
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
                                                                                              • String ID: .dat$.msg$IMsg$Uninstall
                                                                                              • API String ID: 3312786188-1660910688
                                                                                              • Opcode ID: f79b411802c9da3a9116882e1755ce4b3781acbc659f3f1c23c36e526850363e
                                                                                              • Instruction ID: abb28459e614be91aca1b68aa70fad33032f6e559e3bf784a216f74f74fa669e
                                                                                              • Opcode Fuzzy Hash: f79b411802c9da3a9116882e1755ce4b3781acbc659f3f1c23c36e526850363e
                                                                                              • Instruction Fuzzy Hash: 89314F34A14114AFCB00EF65DD9296E7BB5EF89314F91857AF800AB395DB38BD01CB68
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonCreate), ref: 0042EADA
                                                                                              • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EAE0
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042EB09
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressByteCharHandleModuleMultiProcWide
                                                                                              • String ID: ShutdownBlockReasonCreate$user32.dll
                                                                                              • API String ID: 828529508-2866557904
                                                                                              • Opcode ID: eb577c3347fbf9fd6a249885fcfc34f4074b2fa1c1d8d6afc25abb851ecf655c
                                                                                              • Instruction ID: 7e091cf0cf0c4dae12ae48626bdfb721f4796128e550bb25d34418d77cfbcdd5
                                                                                              • Opcode Fuzzy Hash: eb577c3347fbf9fd6a249885fcfc34f4074b2fa1c1d8d6afc25abb851ecf655c
                                                                                              • Instruction Fuzzy Hash: 70F0C8D034061136E620B57F5C82F7B598C8F94759F140436B109E62C2D96CA905426E
                                                                                              APIs
                                                                                              • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 00458028
                                                                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00458049
                                                                                              • CloseHandle.KERNEL32(?,0045807C), ref: 0045806F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
                                                                                              • String ID: GetExitCodeProcess$MsgWaitForMultipleObjects
                                                                                              • API String ID: 2573145106-3235461205
                                                                                              • Opcode ID: f4b7924840392a1c056809c60f673386a353f05297e24ea8de8fb179b7d06f04
                                                                                              • Instruction ID: 2f0632834368beac7d1c7250186d6a5b4d0e74160b608b18ba1b2b0c741dc3d5
                                                                                              • Opcode Fuzzy Hash: f4b7924840392a1c056809c60f673386a353f05297e24ea8de8fb179b7d06f04
                                                                                              • Instruction Fuzzy Hash: 8101A231600204AFD710EBA98C02A5A73A8EB49B25F51407BFC10E73D3DE399E08965D
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA70,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9C2
                                                                                              • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9C8
                                                                                              • InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9D9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressExchangeHandleInterlockedModuleProc
                                                                                              • String ID: ChangeWindowMessageFilter$user32.dll
                                                                                              • API String ID: 3478007392-2498399450
                                                                                              • Opcode ID: 3254194633b527647525dea76c004eb0f33bc99a9c522dc813bf1be520244ffe
                                                                                              • Instruction ID: c922fa4e85abb1c6873f36dcd01b6443d81c66d6c3501223796626af46e79b09
                                                                                              • Opcode Fuzzy Hash: 3254194633b527647525dea76c004eb0f33bc99a9c522dc813bf1be520244ffe
                                                                                              • Instruction Fuzzy Hash: 5CE0ECB2740324EADA103B627E8AF663558E724B19F50043BF001751F1C7FD1C80CA9E
                                                                                              APIs
                                                                                              • GetWindowThreadProcessId.USER32(00000000), ref: 00477B9C
                                                                                              • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477C93,0049C0A8,00000000), ref: 00477BAF
                                                                                              • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477BB5
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressHandleModuleProcProcessThreadWindow
                                                                                              • String ID: AllowSetForegroundWindow$user32.dll
                                                                                              • API String ID: 1782028327-3855017861
                                                                                              • Opcode ID: 0c48b0152dcd94fde7082f0574e48419f86d5c04df14efc0ca492c8631bf730a
                                                                                              • Instruction ID: d51ed2a8d8be4cb67b0f2e6afaff03014389f5b4c9f6752a27b175deb1fe6994
                                                                                              • Opcode Fuzzy Hash: 0c48b0152dcd94fde7082f0574e48419f86d5c04df14efc0ca492c8631bf730a
                                                                                              • Instruction Fuzzy Hash: D7D0C790248701B9D910B3F64D46E9F3A5D894471CB50C47BB418E61C5DA7CFD04893D
                                                                                              APIs
                                                                                              • BeginPaint.USER32(00000000,?), ref: 00416C52
                                                                                              • SaveDC.GDI32(?), ref: 00416C83
                                                                                              • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00416D45), ref: 00416CE4
                                                                                              • RestoreDC.GDI32(?,?), ref: 00416D0B
                                                                                              • EndPaint.USER32(00000000,?,00416D4C,00000000,00416D45), ref: 00416D3F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Paint$BeginClipExcludeRectRestoreSave
                                                                                              • String ID:
                                                                                              • API String ID: 3808407030-0
                                                                                              • Opcode ID: ad781fe6fb59047a66b80eb53a3f65b2019eba16d1c733f202b60e39d660354f
                                                                                              • Instruction ID: 8164e3b37c2b38cc39b91ef4074089abf19b8963c3e0e5cbd12a4ce3d65b1abe
                                                                                              • Opcode Fuzzy Hash: ad781fe6fb59047a66b80eb53a3f65b2019eba16d1c733f202b60e39d660354f
                                                                                              • Instruction Fuzzy Hash: A1415070A002049FCB14DBA9C585FAA77F9FF48304F1540AEE8459B362D778DD81CB58
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: b6913cb722474124f75cff2ee5949f067bbdde1b56a592e148b6496e85af3d5a
                                                                                              • Instruction ID: a833d86c80f2fb81cba799e3b93fc1891ddf3ebdd98a67124a25423b7ab76754
                                                                                              • Opcode Fuzzy Hash: b6913cb722474124f75cff2ee5949f067bbdde1b56a592e148b6496e85af3d5a
                                                                                              • Instruction Fuzzy Hash: 563132746057809FC320EF69C984B9BB7E8AF89354F04491EF9D5C3752C638E8818F19
                                                                                              APIs
                                                                                              • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429808
                                                                                              • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429837
                                                                                              • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 00429853
                                                                                              • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 0042987E
                                                                                              • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 0042989C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend
                                                                                              • String ID:
                                                                                              • API String ID: 3850602802-0
                                                                                              • Opcode ID: 399f588db94bb8b810bf5b46e1237ea7bfd7cbebe0e15a3dbf36720fb68daebb
                                                                                              • Instruction ID: 8b65b0e689063cc909dba6714575951256d1ad54ff8cece17fd29570ea6901c2
                                                                                              • Opcode Fuzzy Hash: 399f588db94bb8b810bf5b46e1237ea7bfd7cbebe0e15a3dbf36720fb68daebb
                                                                                              • Instruction Fuzzy Hash: 6E219D707107057BEB10AB62DC82F5B7AECAB41708F54443EB501AB2D2DFB8AE418228
                                                                                              APIs
                                                                                              • GetSystemMetrics.USER32(0000000B), ref: 0041BBCA
                                                                                              • GetSystemMetrics.USER32(0000000C), ref: 0041BBD4
                                                                                              • GetDC.USER32(00000000), ref: 0041BC12
                                                                                              • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BC59
                                                                                              • DeleteObject.GDI32(00000000), ref: 0041BC9A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: MetricsSystem$BitmapCreateDeleteObject
                                                                                              • String ID:
                                                                                              • API String ID: 1095203571-0
                                                                                              • Opcode ID: d6ecec59309c4539c21f746b1d4641e0a999657a412e1d938322a226e3514674
                                                                                              • Instruction ID: 2a907a32995036c4e239f44386a828d3a2f1e7d44945ead90e55d18394f4d4ff
                                                                                              • Opcode Fuzzy Hash: d6ecec59309c4539c21f746b1d4641e0a999657a412e1d938322a226e3514674
                                                                                              • Instruction Fuzzy Hash: 5D315C70E00208EFDB04DFA5C941AAEB7F5EB48700F2084AAF514AB781D7789E40DB98
                                                                                              APIs
                                                                                                • Part of subcall function 0045D04C: SetLastError.KERNEL32(00000057,00000000,0045D118,?,?,?,?,00000000), ref: 0045D0B7
                                                                                              • GetLastError.KERNEL32(00000000,00000000,00000000,004736AC,?,?,0049C1E0,00000000), ref: 00473665
                                                                                              • GetLastError.KERNEL32(00000000,00000000,00000000,004736AC,?,?,0049C1E0,00000000), ref: 0047367B
                                                                                              Strings
                                                                                              • Failed to set permissions on registry key (%d)., xrefs: 0047368C
                                                                                              • Could not set permissions on the registry key because it currently does not exist., xrefs: 0047366F
                                                                                              • Setting permissions on registry key: %s\%s, xrefs: 0047362A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast
                                                                                              • String ID: Could not set permissions on the registry key because it currently does not exist.$Failed to set permissions on registry key (%d).$Setting permissions on registry key: %s\%s
                                                                                              • API String ID: 1452528299-4018462623
                                                                                              • Opcode ID: 84f5240d3e2a5678dc298f5d2d5fcd3d219003d8bdc0b17d0e0e8e1e879b006c
                                                                                              • Instruction ID: ad6b00cc897a6d1501f3fc6a2a631de3da5dc8c6e7b4eccdfad28332e4495c63
                                                                                              • Opcode Fuzzy Hash: 84f5240d3e2a5678dc298f5d2d5fcd3d219003d8bdc0b17d0e0e8e1e879b006c
                                                                                              • Instruction Fuzzy Hash: A121C870A046445FCB10DFA9C8826EEBBE4DF49319F50817BE408E7392D7785E098B6D
                                                                                              APIs
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                              • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
                                                                                              • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWide$AllocString
                                                                                              • String ID:
                                                                                              • API String ID: 262959230-0
                                                                                              • Opcode ID: dcd45591e65b03bd276bb2a5b0fabad56ebf76f0c081827c2345b0a7b763a240
                                                                                              • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
                                                                                              • Opcode Fuzzy Hash: dcd45591e65b03bd276bb2a5b0fabad56ebf76f0c081827c2345b0a7b763a240
                                                                                              • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
                                                                                              APIs
                                                                                              • SelectPalette.GDI32(00000000,00000000,00000000), ref: 00414419
                                                                                              • RealizePalette.GDI32(00000000), ref: 00414421
                                                                                              • SelectPalette.GDI32(00000000,00000000,00000001), ref: 00414435
                                                                                              • RealizePalette.GDI32(00000000), ref: 0041443B
                                                                                              • ReleaseDC.USER32(00000000,00000000), ref: 00414446
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Palette$RealizeSelect$Release
                                                                                              • String ID:
                                                                                              • API String ID: 2261976640-0
                                                                                              • Opcode ID: c9c8aa66f6917016d7555c0ac5b3df2d15848593dde74026b2272496f15e705b
                                                                                              • Instruction ID: 3cc421e061c7a323c9855e33cbe13bf4890882f9e8533d15179bd5f7679f66d2
                                                                                              • Opcode Fuzzy Hash: c9c8aa66f6917016d7555c0ac5b3df2d15848593dde74026b2272496f15e705b
                                                                                              • Instruction Fuzzy Hash: A2018F7520C3806AE600A63D8C85A9F6BED9FCA718F15446EF495DB282DA7AC8018765
                                                                                              APIs
                                                                                                • Part of subcall function 0041F074: GetActiveWindow.USER32 ref: 0041F077
                                                                                                • Part of subcall function 0041F074: GetCurrentThreadId.KERNEL32 ref: 0041F08C
                                                                                                • Part of subcall function 0041F074: EnumThreadWindows.USER32(00000000,Function_0001F050), ref: 0041F092
                                                                                                • Part of subcall function 004231A8: GetSystemMetrics.USER32(00000000), ref: 004231AA
                                                                                              • OffsetRect.USER32(?,?,?), ref: 00424DC9
                                                                                              • DrawTextA.USER32(00000000,00000000,000000FF,?,00000C10), ref: 00424E8C
                                                                                              • OffsetRect.USER32(?,?,?), ref: 00424E9D
                                                                                                • Part of subcall function 00423564: GetCurrentThreadId.KERNEL32 ref: 00423579
                                                                                                • Part of subcall function 00423564: SetWindowsHookExA.USER32(00000003,00423520,00000000,00000000), ref: 00423589
                                                                                                • Part of subcall function 00423564: CreateThread.KERNEL32(00000000,000003E8,004234D0,00000000,00000000), ref: 004235AD
                                                                                                • Part of subcall function 00424B2C: SetTimer.USER32(00000000,00000001,?,004234B4), ref: 00424B47
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Thread$CurrentOffsetRectWindows$ActiveCreateDrawEnumHookMetricsSystemTextTimerWindow
                                                                                              • String ID: vLB
                                                                                              • API String ID: 1477829881-1797516613
                                                                                              • Opcode ID: af4d35ceb7da7411f9a909d8da5f62e109762c4c9dbecdeb02cfa42cc05a337b
                                                                                              • Instruction ID: 1a85cd152e58b5c2614c87f396891e2b5808bef0cf689969089b0637ec596c27
                                                                                              • Opcode Fuzzy Hash: af4d35ceb7da7411f9a909d8da5f62e109762c4c9dbecdeb02cfa42cc05a337b
                                                                                              • Instruction Fuzzy Hash: C5812675A003188FCB14DFA8D880ADEBBF4FF88314F50416AE905AB296E738AD45CF44
                                                                                              APIs
                                                                                              • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 00407003
                                                                                              • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 0040707D
                                                                                              • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 004070D5
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Enum$NameOpenResourceUniversal
                                                                                              • String ID: Z
                                                                                              • API String ID: 3604996873-1505515367
                                                                                              • Opcode ID: a9e747af3270ad6827a26b5e12e82ea9da9777e5f51a79d453bfa0d7b97e4fbe
                                                                                              • Instruction ID: 78f4b6eea80f90a9c0d6dbacb1000d6f5057f9b0a0312f2c839bfa0eabc808a5
                                                                                              • Opcode Fuzzy Hash: a9e747af3270ad6827a26b5e12e82ea9da9777e5f51a79d453bfa0d7b97e4fbe
                                                                                              • Instruction Fuzzy Hash: 14516470E04208AFDB11DF95C951AAFBBB9EF09304F1045BAE500BB3D1D778AE458B5A
                                                                                              APIs
                                                                                              • SetRectEmpty.USER32(?), ref: 0044D04E
                                                                                              • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044D079
                                                                                              • DrawTextA.USER32(00000000,00000000,00000000,00000000,00000800), ref: 0044D101
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: DrawText$EmptyRect
                                                                                              • String ID:
                                                                                              • API String ID: 182455014-2867612384
                                                                                              • Opcode ID: 9cefa38d4a8adbc35dceb9fbd70f94003a2f7c245499b58eac7a7a86e34dc042
                                                                                              • Instruction ID: ac611c4ae9e9b4e435f74cd3b872a097dcdbbef8ea8fa2dc8c743a2ef399c877
                                                                                              • Opcode Fuzzy Hash: 9cefa38d4a8adbc35dceb9fbd70f94003a2f7c245499b58eac7a7a86e34dc042
                                                                                              • Instruction Fuzzy Hash: 18517171E00248AFDB11DFA5C885BDEBBF8BF48308F18447AE845EB252D7789945CB64
                                                                                              APIs
                                                                                              • GetDC.USER32(00000000), ref: 0042EF9E
                                                                                                • Part of subcall function 0041A1E8: CreateFontIndirectA.GDI32(?), ref: 0041A2A7
                                                                                              • SelectObject.GDI32(?,00000000), ref: 0042EFC1
                                                                                              • ReleaseDC.USER32(00000000,?), ref: 0042F0A0
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFontIndirectObjectReleaseSelect
                                                                                              • String ID: ...\
                                                                                              • API String ID: 3133960002-983595016
                                                                                              • Opcode ID: 174dea87e3c77845355dc2bffde9c2636390ac865bcfddee608935e642ca7c05
                                                                                              • Instruction ID: de545d42c11d103cbad381cc3223c2b5efa9fdb4a6e9ae4bb0445229962d8c70
                                                                                              • Opcode Fuzzy Hash: 174dea87e3c77845355dc2bffde9c2636390ac865bcfddee608935e642ca7c05
                                                                                              • Instruction Fuzzy Hash: 5A316370B00128AFDB11EB96D841BAEB7F8EB09348F90447BE410A7392D7785E49CA59
                                                                                              APIs
                                                                                              • GetFileAttributesA.KERNEL32(00000000,00498B60,00000000,00498306,?,?,00000000,0049B628), ref: 00498280
                                                                                              • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00498B60,00000000,00498306,?,?,00000000,0049B628), ref: 004982A9
                                                                                              • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 004982C2
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$Attributes$Move
                                                                                              • String ID: isRS-%.3u.tmp
                                                                                              • API String ID: 3839737484-3657609586
                                                                                              • Opcode ID: 6425da845d9cf075168c9006b2f4cde8adeeb665172db9fe24e9d2d56fbf6a76
                                                                                              • Instruction ID: fc33356634acd7bce8b4c2965ae56e8bcff63ef6fc68eceab8a95db248f88364
                                                                                              • Opcode Fuzzy Hash: 6425da845d9cf075168c9006b2f4cde8adeeb665172db9fe24e9d2d56fbf6a76
                                                                                              • Instruction Fuzzy Hash: 0B216471E00609ABCF10EFA9C8819AFBBB8AF45714F10457FB814B72D1DB389E018A59
                                                                                              APIs
                                                                                              • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
                                                                                              • ExitProcess.KERNEL32 ref: 00404E0D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExitMessageProcess
                                                                                              • String ID: Error$Runtime error at 00000000
                                                                                              • API String ID: 1220098344-2970929446
                                                                                              • Opcode ID: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                                                                                              • Instruction ID: e2df0dcbf1ce8e07228a8ae3c957e3f7be2bf5582065763199918d440bd3f461
                                                                                              • Opcode Fuzzy Hash: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                                                                                              • Instruction Fuzzy Hash: 8E219560A442414ADB11A779BA8571B3B91D7E5348F04817BE710A73E3C77C8C4487ED
                                                                                              APIs
                                                                                                • Part of subcall function 0042C804: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C828
                                                                                                • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                                • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                              • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 00456C50
                                                                                              • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00456C7D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                                                                                              • String ID: LoadTypeLib$RegisterTypeLib
                                                                                              • API String ID: 1312246647-2435364021
                                                                                              • Opcode ID: 99adc2ab1761f2fa15f1ac99c5dc87c93e60f5f8f6cafab150dd189b668492eb
                                                                                              • Instruction ID: 3ed1135b8019c5f4588910a0035f5c9e1cabb82a18fedb82429c118dce795412
                                                                                              • Opcode Fuzzy Hash: 99adc2ab1761f2fa15f1ac99c5dc87c93e60f5f8f6cafab150dd189b668492eb
                                                                                              • Instruction Fuzzy Hash: 2911B430B00604AFDB02EFA6CD51A5EB7BDEB89705F5184B6FC44D3752DA389904CA24
                                                                                              APIs
                                                                                              • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 0045716E
                                                                                              • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 0045720B
                                                                                              Strings
                                                                                              • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 0045719A
                                                                                              • Failed to create DebugClientWnd, xrefs: 004571D4
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend
                                                                                              • String ID: Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)$Failed to create DebugClientWnd
                                                                                              • API String ID: 3850602802-3720027226
                                                                                              • Opcode ID: 3689ec14d1edae2f57f0a744906126f7255bff4f1947e1d6bbead030c2853570
                                                                                              • Instruction ID: a6ca84080c04e90ac639e3db27cd2c1e4b46fe4ea5f20cae781d9f83c3d7e460
                                                                                              • Opcode Fuzzy Hash: 3689ec14d1edae2f57f0a744906126f7255bff4f1947e1d6bbead030c2853570
                                                                                              • Instruction Fuzzy Hash: 1011E770248240AFD710AB69AC85B5FBBD89B54319F15407AFA849B383D7798C18C7AE
                                                                                              APIs
                                                                                                • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
                                                                                              • GetFocus.USER32 ref: 00478757
                                                                                              • GetKeyState.USER32(0000007A), ref: 00478769
                                                                                              • WaitMessage.USER32(?,00000000,00478790,?,00000000,004787B7,?,?,00000001,00000000,?,?,?,00480402,00000000,004812C8), ref: 00478773
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: FocusMessageStateTextWaitWindow
                                                                                              • String ID: Wnd=$%x
                                                                                              • API String ID: 1381870634-2927251529
                                                                                              • Opcode ID: c0ca7a1e78f0957e158d44939737d51478939e9ac1b0c689120181bc9166dade
                                                                                              • Instruction ID: f17a5035e7dee30901ec9a03c3a5a372f1d0714b29ccd98a4f066b2945bd060b
                                                                                              • Opcode Fuzzy Hash: c0ca7a1e78f0957e158d44939737d51478939e9ac1b0c689120181bc9166dade
                                                                                              • Instruction Fuzzy Hash: CE11C634A40244AFD704EF65DC49A9EBBF8EB49314F6184BFF409E7681DB386D00CA69
                                                                                              APIs
                                                                                              • FileTimeToLocalFileTime.KERNEL32(?), ref: 0046E618
                                                                                              • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 0046E627
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Time$File$LocalSystem
                                                                                              • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                                                                                              • API String ID: 1748579591-1013271723
                                                                                              • Opcode ID: 93d3f9926fe1e9ec47fc0153e923e0389e011619b8f85a7a05f57e02ab74589b
                                                                                              • Instruction ID: 5dd65cae4c1adac9d47cc9ad6336eda1851498fedff4a8a979bd050f9c4a6815
                                                                                              • Opcode Fuzzy Hash: 93d3f9926fe1e9ec47fc0153e923e0389e011619b8f85a7a05f57e02ab74589b
                                                                                              • Instruction Fuzzy Hash: A81136A440C3909ED340DF2AC04432BBAE4AB99704F44892EF8C8C6381E779C848DBB7
                                                                                              APIs
                                                                                              • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 00453F83
                                                                                                • Part of subcall function 00406F50: DeleteFileA.KERNEL32(00000000,0049B628,004986F1,00000000,00498746,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F5B
                                                                                              • MoveFileA.KERNEL32(00000000,00000000), ref: 00453FA8
                                                                                                • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$AttributesDeleteErrorLastMove
                                                                                              • String ID: DeleteFile$MoveFile
                                                                                              • API String ID: 3024442154-139070271
                                                                                              • Opcode ID: ad4ba0b838e9d5317ad6887f6d8cb75152b6b17696a4ed4ee46c007163692804
                                                                                              • Instruction ID: b5871bee3d194af1fa843ac656f6d820fc0ba16d57580c91db5694710367c43f
                                                                                              • Opcode Fuzzy Hash: ad4ba0b838e9d5317ad6887f6d8cb75152b6b17696a4ed4ee46c007163692804
                                                                                              • Instruction Fuzzy Hash: AEF062716142045BD701FBA2D84266EA7ECDB8435EF60443BB900BB6C3DA3C9E094529
                                                                                              APIs
                                                                                                • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                              • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,004594A1,00000000,00459659,?,00000000,00000000,00000000), ref: 004593B1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseOpen
                                                                                              • String ID: .NET Framework not found$InstallRoot$SOFTWARE\Microsoft\.NETFramework
                                                                                              • API String ID: 47109696-2631785700
                                                                                              • Opcode ID: be4fb59b900ee74e718d87cdc4fcd1eef43a9c564c0a5ec1af3f625bb6e6dd39
                                                                                              • Instruction ID: 1950c6f853cc10ed35e504d9d8503a730f6ffd27dc9bba4e9fa27fab35675349
                                                                                              • Opcode Fuzzy Hash: be4fb59b900ee74e718d87cdc4fcd1eef43a9c564c0a5ec1af3f625bb6e6dd39
                                                                                              • Instruction Fuzzy Hash: 12F0AF31300110DBCB10EB9AD885B6F6299DB9931AF50503BF981DB293E73CCC168629
                                                                                              APIs
                                                                                                • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                              • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00483C05
                                                                                              • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00483C28
                                                                                              Strings
                                                                                              • System\CurrentControlSet\Control\Windows, xrefs: 00483BD2
                                                                                              • CSDVersion, xrefs: 00483BFC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseOpenQueryValue
                                                                                              • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                                                                                              • API String ID: 3677997916-1910633163
                                                                                              • Opcode ID: 33fca6af7241f4b653fe53c350a6e88c669f1de2ef3da1c7a1752152dae0c121
                                                                                              • Instruction ID: 1d850e848a14c5c59b8e95f13e5f63a8fb365af486cc5d6c9f9b701d22fca986
                                                                                              • Opcode Fuzzy Hash: 33fca6af7241f4b653fe53c350a6e88c669f1de2ef3da1c7a1752152dae0c121
                                                                                              • Instruction Fuzzy Hash: 56F03176E40208A6DF10EAD48C45BAFB3BCAB14B05F104967EA10F7280E678AB048B59
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453B5A,00000000,00453BFD,?,?,00000000,00000000,00000000,00000000,00000000,?,00453FED,00000000), ref: 0042D90A
                                                                                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D910
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressHandleModuleProc
                                                                                              • String ID: GetSystemWow64DirectoryA$kernel32.dll
                                                                                              • API String ID: 1646373207-4063490227
                                                                                              • Opcode ID: 3965e48138ab8598cb17ff311cd558fd433aca8a834515e354a81fb776e31baf
                                                                                              • Instruction ID: 657275fb9dfacbe144619f02b172540cf2f0c5a6f4252bec6bd03a25d2dd35a2
                                                                                              • Opcode Fuzzy Hash: 3965e48138ab8598cb17ff311cd558fd433aca8a834515e354a81fb776e31baf
                                                                                              • Instruction Fuzzy Hash: A5E0DFE0B40B0122D70032BA1C82B6B108D4B84728F90053B3894E62D6DDBCD9840A6D
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042EAD0), ref: 0042EB62
                                                                                              • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EB68
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressHandleModuleProc
                                                                                              • String ID: ShutdownBlockReasonDestroy$user32.dll
                                                                                              • API String ID: 1646373207-260599015
                                                                                              • Opcode ID: 88ce12e330a2fc51ece58c284b54de3a76b504cb94a4c995bd1a3fb2c6ea0693
                                                                                              • Instruction ID: e1ec077e445c8734ae54db5ffdd633522f5c412f0b7fee52e54de0d29bb4c321
                                                                                              • Opcode Fuzzy Hash: 88ce12e330a2fc51ece58c284b54de3a76b504cb94a4c995bd1a3fb2c6ea0693
                                                                                              • Instruction Fuzzy Hash: A2D0C793311732665D10B1F73CD1EAB058C891527935404B7F515E5641D55DEC1115AD
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,00498BF2), ref: 0044F77F
                                                                                              • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F785
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressHandleModuleProc
                                                                                              • String ID: NotifyWinEvent$user32.dll
                                                                                              • API String ID: 1646373207-597752486
                                                                                              • Opcode ID: f97c3de5cacafbf63d36e16939e29d51eb7e912e87a0fb2b79f6fc39cd446e20
                                                                                              • Instruction ID: 5e946f17392c81a4f172a46fe169fb9a1f72c9003761a5edf28bd31acc2f1150
                                                                                              • Opcode Fuzzy Hash: f97c3de5cacafbf63d36e16939e29d51eb7e912e87a0fb2b79f6fc39cd446e20
                                                                                              • Instruction Fuzzy Hash: 59E012F0E417049AFF00BBB57B86B1A3A90E764719B00057FF414A6292DB7C481C4F9D
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498C48,00000001,00000000,00498C6C), ref: 00498972
                                                                                              • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498978
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressHandleModuleProc
                                                                                              • String ID: DisableProcessWindowsGhosting$user32.dll
                                                                                              • API String ID: 1646373207-834958232
                                                                                              • Opcode ID: 71af8591fbce5d4533a7188bae6238bebf63b2f5996384562a89c67780edd1c3
                                                                                              • Instruction ID: 34f838485a85c0df890c3e192e44216071158a5cea444d63bbc0a0b2480586ef
                                                                                              • Opcode Fuzzy Hash: 71af8591fbce5d4533a7188bae6238bebf63b2f5996384562a89c67780edd1c3
                                                                                              • Instruction Fuzzy Hash: 22B002C0651707589D5032FA0D06B3F48484C5276D728057F3414A51C6DD6C89115D3F
                                                                                              APIs
                                                                                                • Part of subcall function 0044B658: LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F775,00498BF2), ref: 0044B67F
                                                                                                • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B697
                                                                                                • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6A9
                                                                                                • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6BB
                                                                                                • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6CD
                                                                                                • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6DF
                                                                                                • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6F1
                                                                                                • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B703
                                                                                                • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B715
                                                                                                • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B727
                                                                                                • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B739
                                                                                                • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B74B
                                                                                                • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B75D
                                                                                                • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B76F
                                                                                                • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B781
                                                                                                • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B793
                                                                                                • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7A5
                                                                                                • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7B7
                                                                                              • LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00498C1A), ref: 00464603
                                                                                              • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464609
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$LibraryLoad
                                                                                              • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                                              • API String ID: 2238633743-2683653824
                                                                                              • Opcode ID: edc6f8ec64a36a5908760ff58e990ea99ea877eb638915fc896b3384d426fa6b
                                                                                              • Instruction ID: ed4894befccbfeda2ad80f7d1b9e1cb4df1a551eae9986247d0c145e26b1cd95
                                                                                              • Opcode Fuzzy Hash: edc6f8ec64a36a5908760ff58e990ea99ea877eb638915fc896b3384d426fa6b
                                                                                              • Instruction Fuzzy Hash: DDB092D0A82740A4C90077F2985B90F2A4488A271EB10153B710476483EABC84100EAE
                                                                                              APIs
                                                                                              • FindNextFileA.KERNEL32(000000FF,?,00000000,0047D7F0,?,?,?,?,00000000,0047D945,?,?,?,00000000,?,0047DA54), ref: 0047D7CC
                                                                                              • FindClose.KERNEL32(000000FF,0047D7F7,0047D7F0,?,?,?,?,00000000,0047D945,?,?,?,00000000,?,0047DA54,00000000), ref: 0047D7EA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Find$CloseFileNext
                                                                                              • String ID:
                                                                                              • API String ID: 2066263336-0
                                                                                              • Opcode ID: df8c12b404288ac1cc0f16a4307cfa19f630790b74cd409a531bdd723e619500
                                                                                              • Instruction ID: 2ce97de6e4eb512f8d4c2eb376340b964b0e691095a652a34be041e4083b4e02
                                                                                              • Opcode Fuzzy Hash: df8c12b404288ac1cc0f16a4307cfa19f630790b74cd409a531bdd723e619500
                                                                                              • Instruction Fuzzy Hash: 07813A74D0024D9FCF11EFA5CC91ADFBBB8EF49304F5080AAE908A7291D6399A46CF54
                                                                                              APIs
                                                                                                • Part of subcall function 0042EE30: GetTickCount.KERNEL32 ref: 0042EE36
                                                                                                • Part of subcall function 0042EC88: MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0042ECBD
                                                                                              • GetLastError.KERNEL32(00000000,00475721,?,?,0049C1E0,00000000), ref: 0047560A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CountErrorFileLastMoveTick
                                                                                              • String ID: $LoggedMsgBox returned an unexpected value. Assuming Cancel.$MoveFileEx
                                                                                              • API String ID: 2406187244-2685451598
                                                                                              • Opcode ID: b4e541c37b522712e9a51433fba2d6f7c47cca6c6c5b44fd3a0118cd85a505a9
                                                                                              • Instruction ID: cfe7f312216358cbd0971b398f0cafde252de4893b1317a5ce8d70824cf78b76
                                                                                              • Opcode Fuzzy Hash: b4e541c37b522712e9a51433fba2d6f7c47cca6c6c5b44fd3a0118cd85a505a9
                                                                                              • Instruction Fuzzy Hash: 4D418570A006099BDB10EFA5D882AEF77B5FF48314F508537E408BB395D7789A058BA9
                                                                                              APIs
                                                                                              • GetDesktopWindow.USER32 ref: 00413D46
                                                                                              • GetDesktopWindow.USER32 ref: 00413DFE
                                                                                                • Part of subcall function 00418EC0: 6FCFC6F0.COMCTL32(?,00000000,00413FC3,00000000,004140D3,?,?,0049B628), ref: 00418EDC
                                                                                                • Part of subcall function 00418EC0: ShowCursor.USER32(00000001,?,00000000,00413FC3,00000000,004140D3,?,?,0049B628), ref: 00418EF9
                                                                                              • SetCursor.USER32(00000000,?,?,?,?,00413AF3,00000000,00413B06), ref: 00413E3C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CursorDesktopWindow$Show
                                                                                              • String ID:
                                                                                              • API String ID: 2074268717-0
                                                                                              • Opcode ID: 48e3412c1a46991eea637d4b1b247886da5b7466a2ee9d80c19fa9edf3c8b710
                                                                                              • Instruction ID: d0219f8535474b9b7e790bb207accfb6dce16a9ac66decbe361331da1304c66b
                                                                                              • Opcode Fuzzy Hash: 48e3412c1a46991eea637d4b1b247886da5b7466a2ee9d80c19fa9edf3c8b710
                                                                                              • Instruction Fuzzy Hash: 91412C75600210AFC710DF2AFA84B56B7E1EB65329B16817BE405CB365DB38DD81CF98
                                                                                              APIs
                                                                                              • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 00408A75
                                                                                              • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408AE4
                                                                                              • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408B7F
                                                                                              • MessageBoxA.USER32(00000000,?,?,00002010), ref: 00408BBE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: LoadString$FileMessageModuleName
                                                                                              • String ID:
                                                                                              • API String ID: 704749118-0
                                                                                              • Opcode ID: ede814ba8b2c905ab74f80468cae56b5ab65d73ed59c96bbcc76a4520df8398d
                                                                                              • Instruction ID: 7d65b0a5aa49ad722f3f3263bbe29e3330acee4661d9e2153cfe083702b22da2
                                                                                              • Opcode Fuzzy Hash: ede814ba8b2c905ab74f80468cae56b5ab65d73ed59c96bbcc76a4520df8398d
                                                                                              • Instruction Fuzzy Hash: 1F3123716083849AD370EB65C945BDF77D89B85704F40483FB6C8E72D1EB7859048B6B
                                                                                              APIs
                                                                                              • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044E90D
                                                                                                • Part of subcall function 0044CF50: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044CF82
                                                                                              • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044E991
                                                                                                • Part of subcall function 0042BBB4: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042BBC8
                                                                                              • IsRectEmpty.USER32(?), ref: 0044E953
                                                                                              • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044E976
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                                                                                              • String ID:
                                                                                              • API String ID: 855768636-0
                                                                                              • Opcode ID: a4575d285c62c1c56b7686ad69dfdc5ef60a631fed5d3d1fc0705a1474777ead
                                                                                              • Instruction ID: f7bad605b8f68185b4e834990bb8ca2287257270a928060092b59a923d315d7c
                                                                                              • Opcode Fuzzy Hash: a4575d285c62c1c56b7686ad69dfdc5ef60a631fed5d3d1fc0705a1474777ead
                                                                                              • Instruction Fuzzy Hash: E5114A71B0030067E650BA7B8C86B5B76C9AB88748F15083FB545EB387DE7DDD094299
                                                                                              APIs
                                                                                              • OffsetRect.USER32(?,?,00000000), ref: 00495988
                                                                                              • OffsetRect.USER32(?,00000000,?), ref: 004959A3
                                                                                              • OffsetRect.USER32(?,?,00000000), ref: 004959BD
                                                                                              • OffsetRect.USER32(?,00000000,?), ref: 004959D8
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: OffsetRect
                                                                                              • String ID:
                                                                                              • API String ID: 177026234-0
                                                                                              • Opcode ID: e6cd63ab1267e2bef36e0ea42f4f89ffcc49fa5b03609306a0fb63f812f5ac90
                                                                                              • Instruction ID: 9409249b62c1188f54b5b62e2685c04785358b71117f53a2337039625fc08c68
                                                                                              • Opcode Fuzzy Hash: e6cd63ab1267e2bef36e0ea42f4f89ffcc49fa5b03609306a0fb63f812f5ac90
                                                                                              • Instruction Fuzzy Hash: 1121AEB6700701AFDB00DE69CD81E5BB7DAEFC4350F248A2AF944C3249D638ED048761
                                                                                              APIs
                                                                                              • GetCursorPos.USER32 ref: 00417260
                                                                                              • SetCursor.USER32(00000000), ref: 004172A3
                                                                                              • GetLastActivePopup.USER32(?), ref: 004172CD
                                                                                              • GetForegroundWindow.USER32(?), ref: 004172D4
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Cursor$ActiveForegroundLastPopupWindow
                                                                                              • String ID:
                                                                                              • API String ID: 1959210111-0
                                                                                              • Opcode ID: 0325eb73ca892009698aa7541b5e3073a06fcfb7bd7d3fb361e05756697ccdec
                                                                                              • Instruction ID: de3f0dc6b436800086b9427ec8ddd2ec86eeedce3a35093462374e80c8eda50e
                                                                                              • Opcode Fuzzy Hash: 0325eb73ca892009698aa7541b5e3073a06fcfb7bd7d3fb361e05756697ccdec
                                                                                              • Instruction Fuzzy Hash: C52183313086118AD720AFA9E945AE733F1EF44754B0544ABF8558B352DB3DDC82CB9E
                                                                                              APIs
                                                                                              • MulDiv.KERNEL32(?,00000008,?), ref: 004955F1
                                                                                              • MulDiv.KERNEL32(?,00000008,?), ref: 00495605
                                                                                              • MulDiv.KERNEL32(?,00000008,?), ref: 00495619
                                                                                              • MulDiv.KERNEL32(?,00000008,?), ref: 00495637
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                                                              • Instruction ID: b77f8f3c6746ea581d036ce488ab013aedd37a602364075716cddbfd1b85439e
                                                                                              • Opcode Fuzzy Hash: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                                                              • Instruction Fuzzy Hash: A5112E72604504ABCB40DEA9D8C4D9B7BECEF8D324B6441AAF908DB242D674ED408B68
                                                                                              APIs
                                                                                              • GetClassInfoA.USER32(00400000,0041F470,?), ref: 0041F4A1
                                                                                              • UnregisterClassA.USER32(0041F470,00400000), ref: 0041F4CA
                                                                                              • RegisterClassA.USER32(00499598), ref: 0041F4D4
                                                                                              • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F50F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Class$InfoLongRegisterUnregisterWindow
                                                                                              • String ID:
                                                                                              • API String ID: 4025006896-0
                                                                                              • Opcode ID: 7a514111b6068dfbbdb04c48d1a2146d17cf63cab41d43eccfd0167b2dbd8d5c
                                                                                              • Instruction ID: 7a0dc659497f48f9aad4428a0df7724adcaf244520b53866b591a9b3b5545ee4
                                                                                              • Opcode Fuzzy Hash: 7a514111b6068dfbbdb04c48d1a2146d17cf63cab41d43eccfd0167b2dbd8d5c
                                                                                              • Instruction Fuzzy Hash: F6011B72240104AADA10EBACED81E9B33999729314B11423BB615E72A2D6399C558BAC
                                                                                              APIs
                                                                                              • WaitForInputIdle.USER32(?,00000032), ref: 00454FA8
                                                                                              • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00454FCA
                                                                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00454FD9
                                                                                              • CloseHandle.KERNEL32(?,00455006,00454FFF,?,?,?,00000000,?,?,004551DB,?,?,?,00000044,00000000,00000000), ref: 00454FF9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
                                                                                              • String ID:
                                                                                              • API String ID: 4071923889-0
                                                                                              • Opcode ID: 8aa0dd6ec5a68f6f7641eb82506f7728cd0b20fc7582fe19e2ee2bc87ac6724f
                                                                                              • Instruction ID: ea90b2abd28d60bbe0c33bbe6d7a83e36ef454db8471bda6b5c19e9a906557d9
                                                                                              • Opcode Fuzzy Hash: 8aa0dd6ec5a68f6f7641eb82506f7728cd0b20fc7582fe19e2ee2bc87ac6724f
                                                                                              • Instruction Fuzzy Hash: B9012D31A006097FEB1097AA8C02F6FBBECDF49764F610127F904D72C2C5788D409A78
                                                                                              APIs
                                                                                              • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D027
                                                                                              • LoadResource.KERNEL32(00400000,72756F73,0040A7C8,00400000,00000001,00000000,?,0040CF84,00000000,?,00000000,?,?,0047CB58,0000000A,00000000), ref: 0040D041
                                                                                              • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040A7C8,00400000,00000001,00000000,?,0040CF84,00000000,?,00000000,?,?,0047CB58), ref: 0040D05B
                                                                                              • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040A7C8,00400000,00000001,00000000,?,0040CF84,00000000,?,00000000,?), ref: 0040D065
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Resource$FindLoadLockSizeof
                                                                                              • String ID:
                                                                                              • API String ID: 3473537107-0
                                                                                              • Opcode ID: f701ce4f04cb0ebdd1143b5585c75acb70ffd029a82b31343d3be87257736b7b
                                                                                              • Instruction ID: ce77ce8360aa458f47a01e9b0563465317cd85cc21d7bcd45488e041df035c61
                                                                                              • Opcode Fuzzy Hash: f701ce4f04cb0ebdd1143b5585c75acb70ffd029a82b31343d3be87257736b7b
                                                                                              • Instruction Fuzzy Hash: 49F04F726056046F9B14EE59A881D5B77ECDE88268310013AF908E7286DA38DD018B68
                                                                                              APIs
                                                                                              • RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,0225C498,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                                              • RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,0225C498,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                                              • LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,0225C498,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                                              • RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,0225C498,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                                              • String ID:
                                                                                              • API String ID: 730355536-0
                                                                                              • Opcode ID: 0971dfa849a4ffc4cae04a3e1ff9e59bd0eaa306d87ad714f1f0155365df5b79
                                                                                              • Instruction ID: 91310e2de28581c92a9b529d79901d52005bdf0b1253609ef7109df0d78d257f
                                                                                              • Opcode Fuzzy Hash: 0971dfa849a4ffc4cae04a3e1ff9e59bd0eaa306d87ad714f1f0155365df5b79
                                                                                              • Instruction Fuzzy Hash: D001A1706482409EE719AB69BA467253FD4D795B48F11803BF840A6BF3C77C4440EBAD
                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(?,00000000), ref: 004705F1
                                                                                              Strings
                                                                                              • Unsetting NTFS compression on file: %s, xrefs: 004705D7
                                                                                              • Failed to set NTFS compression state (%d)., xrefs: 00470602
                                                                                              • Setting NTFS compression on file: %s, xrefs: 004705BF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast
                                                                                              • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
                                                                                              • API String ID: 1452528299-3038984924
                                                                                              • Opcode ID: 4a85a403c5f553919e8eb8264edf58c674aea38054a880eb2495f4adb197a451
                                                                                              • Instruction ID: 452327faed6fd823952186a677ff1a78a18aba12ee86070aec797b5412e08bdc
                                                                                              • Opcode Fuzzy Hash: 4a85a403c5f553919e8eb8264edf58c674aea38054a880eb2495f4adb197a451
                                                                                              • Instruction Fuzzy Hash: A5018B71D09248A6CB04D7AD94512DDBBE49F4D314F44C5FFE459D7342DB780A088B9E
                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(00000000,00000000), ref: 0046FE45
                                                                                              Strings
                                                                                              • Setting NTFS compression on directory: %s, xrefs: 0046FE13
                                                                                              • Unsetting NTFS compression on directory: %s, xrefs: 0046FE2B
                                                                                              • Failed to set NTFS compression state (%d)., xrefs: 0046FE56
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast
                                                                                              • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
                                                                                              • API String ID: 1452528299-1392080489
                                                                                              • Opcode ID: 01501a136b81c39b7c411191948b84cc59583678e1d21d505a98b8108a1a9e37
                                                                                              • Instruction ID: 6c3eba688a3488f6cff2036d9eec8e6f632fba0cce39d579df3f4bd3b957a0ce
                                                                                              • Opcode Fuzzy Hash: 01501a136b81c39b7c411191948b84cc59583678e1d21d505a98b8108a1a9e37
                                                                                              • Instruction Fuzzy Hash: E5014421E0824856CB04D7ADE44129DBBA49F49304F4485BBA495E7253EB790A09879B
                                                                                              APIs
                                                                                                • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                              • RegDeleteValueA.ADVAPI32(?,00000000,?,00000002,00000000,?,?,00000000,0045B7AE,?,?,?,?,?,00000000,0045B7D5), ref: 00455DD8
                                                                                              • RegCloseKey.ADVAPI32(00000000,?,00000000,?,00000002,00000000,?,?,00000000,0045B7AE,?,?,?,?,?,00000000), ref: 00455DE1
                                                                                              • RemoveFontResourceA.GDI32(00000000), ref: 00455DEE
                                                                                              • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00455E02
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
                                                                                              • String ID:
                                                                                              • API String ID: 4283692357-0
                                                                                              • Opcode ID: f8aea33aa1dfe48501da451cbaaab358c9a7ac193b9fd61d7dd35e15a1d684ec
                                                                                              • Instruction ID: 71ccc6c4ad223293e5fa71c014565a1ca4f3f808124b73c5b0663eb55104ffd2
                                                                                              • Opcode Fuzzy Hash: f8aea33aa1dfe48501da451cbaaab358c9a7ac193b9fd61d7dd35e15a1d684ec
                                                                                              • Instruction Fuzzy Hash: 57F0BEB174070036EA10B6BAAC4BF2B26CC8F54745F10883ABA00EF2C3D97CDC04962D
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$CountSleepTick
                                                                                              • String ID:
                                                                                              • API String ID: 2227064392-0
                                                                                              • Opcode ID: dfa0650b41a5fbb69b4da717be5ba207ba5450cdb50d9376c11a56b5a3797e8a
                                                                                              • Instruction ID: 56d8cd0ebf6ab4a4d31aad6ab38b951dee0ff9c0bbbb70c30f4e079d31b44593
                                                                                              • Opcode Fuzzy Hash: dfa0650b41a5fbb69b4da717be5ba207ba5450cdb50d9376c11a56b5a3797e8a
                                                                                              • Instruction Fuzzy Hash: C6E0ED6A30921149863131AE98CA6AF4D48CBC2324B28853FE08CE6283C89C4C0A867E
                                                                                              APIs
                                                                                              • GetCurrentProcess.KERNEL32(00000008,?,?,?,00000001,00000000,00000002,00000000,004812C8,?,?,?,?,?,00498CDB,00000000), ref: 0047820D
                                                                                              • OpenProcessToken.ADVAPI32(00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,004812C8,?,?,?,?,?,00498CDB), ref: 00478213
                                                                                              • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,004812C8), ref: 00478235
                                                                                              • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,004812C8), ref: 00478246
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                                                              • String ID:
                                                                                              • API String ID: 215268677-0
                                                                                              • Opcode ID: 89672e1c1dad377db11468aaf314ccfc00159a4e206af17bba33db1213e8e157
                                                                                              • Instruction ID: 91f0679cb69370e855683a510bc75a037ced8834772831ea40795c83ba0b1c60
                                                                                              • Opcode Fuzzy Hash: 89672e1c1dad377db11468aaf314ccfc00159a4e206af17bba33db1213e8e157
                                                                                              • Instruction Fuzzy Hash: D8F037716447007BD600E6B58C81E5B73DCEB44354F04493E7E98C71C1DA78DC089776
                                                                                              APIs
                                                                                              • GetLastActivePopup.USER32(?), ref: 0042424C
                                                                                              • IsWindowVisible.USER32(?), ref: 0042425D
                                                                                              • IsWindowEnabled.USER32(?), ref: 00424267
                                                                                              • SetForegroundWindow.USER32(?), ref: 00424271
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                                                                              • String ID:
                                                                                              • API String ID: 2280970139-0
                                                                                              • Opcode ID: d317456c615bf9008b67529b06aff5f9fae4f5f479d94640f2b11ca0dbd6cbb7
                                                                                              • Instruction ID: 2c5ff33fc315f6eb6fab431e1453bcb0e66c5aaaa6596e28cc8dc28fd0b03a53
                                                                                              • Opcode Fuzzy Hash: d317456c615bf9008b67529b06aff5f9fae4f5f479d94640f2b11ca0dbd6cbb7
                                                                                              • Instruction Fuzzy Hash: C7E0EC61B02672D6AE31FA7B2881A9F518C9D45BE434641EBBC04FB38ADB2CDC1141BD
                                                                                              APIs
                                                                                              • GlobalHandle.KERNEL32 ref: 0040626F
                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00406276
                                                                                              • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 0040627B
                                                                                              • GlobalLock.KERNEL32(00000000), ref: 00406281
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Global$AllocHandleLockUnlock
                                                                                              • String ID:
                                                                                              • API String ID: 2167344118-0
                                                                                              • Opcode ID: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
                                                                                              • Instruction ID: 5df08fd8dc2b017785a639aa93036e57be915985ffe03f20f856cac12e18577c
                                                                                              • Opcode Fuzzy Hash: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
                                                                                              • Instruction Fuzzy Hash: 0BB009C4810A01BEEC0473B24C0BE3F245CD88172C3904A6F3448BA183987C9C405A3A
                                                                                              APIs
                                                                                              • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,0047BB01,?,00000000,00000000,00000001,00000000,0047A4B5,?,00000000), ref: 0047A479
                                                                                              Strings
                                                                                              • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 0047A2ED
                                                                                              • Failed to parse "reg" constant, xrefs: 0047A480
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Close
                                                                                              • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant
                                                                                              • API String ID: 3535843008-1938159461
                                                                                              • Opcode ID: 05ee6b3b67afee6859f894b9066335fb286a048b1f35c691c8bdca609618c678
                                                                                              • Instruction ID: 25f2a786541cb687838a6194ffc4a73185deb9e5551b5ad8c851c0bf1152322b
                                                                                              • Opcode Fuzzy Hash: 05ee6b3b67afee6859f894b9066335fb286a048b1f35c691c8bdca609618c678
                                                                                              • Instruction Fuzzy Hash: 22817274E00108AFCB10DF95D485ADEBBF9AF88344F50817AE814B7392D739AE05CB99
                                                                                              APIs
                                                                                              • GetForegroundWindow.USER32(00000000,00483716,?,00000000,00483757,?,?,?,?,00000000,00000000,00000000,?,0046BD99), ref: 004835C5
                                                                                              • SetActiveWindow.USER32(?,00000000,00483716,?,00000000,00483757,?,?,?,?,00000000,00000000,00000000,?,0046BD99), ref: 004835D7
                                                                                              Strings
                                                                                              • Will not restart Windows automatically., xrefs: 004836F6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$ActiveForeground
                                                                                              • String ID: Will not restart Windows automatically.
                                                                                              • API String ID: 307657957-4169339592
                                                                                              • Opcode ID: ceb5e1da4dc76295146827fa9bc1951038eb8722099578625e3d3877b71a3664
                                                                                              • Instruction ID: 4bdce942002d158aae482430f0c171f92fa141a3e9c551c877f01fd154286bbb
                                                                                              • Opcode Fuzzy Hash: ceb5e1da4dc76295146827fa9bc1951038eb8722099578625e3d3877b71a3664
                                                                                              • Instruction Fuzzy Hash: 7F414870648240BFD321FF68DC92B6D3BE49718B09F6448B7E440573A2E37D9A059B1D
                                                                                              APIs
                                                                                              • LocalFileTimeToFileTime.KERNEL32(?,?,?,00000000,00000000,004764DF,?,00000000,004764F0,?,00000000,00476539), ref: 004764B0
                                                                                              • SetFileTime.KERNEL32(?,00000000,00000000,?,?,?,?,00000000,00000000,004764DF,?,00000000,004764F0,?,00000000,00476539), ref: 004764C4
                                                                                              Strings
                                                                                              • Extracting temporary file: , xrefs: 004763EC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileTime$Local
                                                                                              • String ID: Extracting temporary file:
                                                                                              • API String ID: 791338737-4171118009
                                                                                              • Opcode ID: a80e35328548893b295efc7472ac722154afa94c34651c27e26e6e8334cb8313
                                                                                              • Instruction ID: 173659db1c42fed311bbc77dc24fc0b62308bfde4479aaaaa113f8cb774a82d8
                                                                                              • Opcode Fuzzy Hash: a80e35328548893b295efc7472ac722154afa94c34651c27e26e6e8334cb8313
                                                                                              • Instruction Fuzzy Hash: 9541B670E00649AFCB01DFA5C892AAFBBB9EB09704F51847AF814A7291D7789905CB58
                                                                                              Strings
                                                                                              • Failed to proceed to next wizard page; aborting., xrefs: 0046CD24
                                                                                              • Failed to proceed to next wizard page; showing wizard., xrefs: 0046CD38
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                                                                                              • API String ID: 0-1974262853
                                                                                              • Opcode ID: 7a25e1645a33cbe6e929f5c7beb1038c0aed19b3e354743701339651447d5c4b
                                                                                              • Instruction ID: bcb3787111d781b294161d03010f6e791927551fc3c7e501f8e48cd77162cd73
                                                                                              • Opcode Fuzzy Hash: 7a25e1645a33cbe6e929f5c7beb1038c0aed19b3e354743701339651447d5c4b
                                                                                              • Instruction Fuzzy Hash: A531C430604204DFD711EB59D9C5BA977F5EB06304F5500BBF448AB392D7786E40CB49
                                                                                              APIs
                                                                                                • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                              • RegCloseKey.ADVAPI32(?,00478F7E,?,?,00000001,00000000,00000000,00478F99), ref: 00478F67
                                                                                              Strings
                                                                                              • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00478EF2
                                                                                              • %s\%s_is1, xrefs: 00478F10
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseOpen
                                                                                              • String ID: %s\%s_is1$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                                              • API String ID: 47109696-1598650737
                                                                                              • Opcode ID: 4390143081fa1cbfc05a77ab89ffad6b83c856e6c2d55465ffb8b64579313e9f
                                                                                              • Instruction ID: 4b2a563bf9abf46f4fe3d7c32e0d4fce195dfbf5fea183d3e913b06dd9c9918d
                                                                                              • Opcode Fuzzy Hash: 4390143081fa1cbfc05a77ab89ffad6b83c856e6c2d55465ffb8b64579313e9f
                                                                                              • Instruction Fuzzy Hash: EC218070B44244AFDB11DBA9CC45A9EBBF9EB8D704F90847BE408E7381DB789D018B58
                                                                                              APIs
                                                                                              • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 004501FD
                                                                                              • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 0045022E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExecuteMessageSendShell
                                                                                              • String ID: open
                                                                                              • API String ID: 812272486-2758837156
                                                                                              • Opcode ID: ea446b968c091deb5619fe0c64f284e9fafe3e6cb185d1fb8701354efc215884
                                                                                              • Instruction ID: 7f57506e0c07b49dd0b520b237e7736b759e9f4ed638734fb0c833ac5abbff07
                                                                                              • Opcode Fuzzy Hash: ea446b968c091deb5619fe0c64f284e9fafe3e6cb185d1fb8701354efc215884
                                                                                              • Instruction Fuzzy Hash: A1216074E00204AFDB10DFA9C896B9EBBF8EB44705F1081BAB404E7292D678DE45CA59
                                                                                              APIs
                                                                                              • ShellExecuteEx.SHELL32(0000003C), ref: 0045532C
                                                                                              • GetLastError.KERNEL32(0000003C,00000000,00455375,?,?,?), ref: 0045533D
                                                                                                • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: DirectoryErrorExecuteLastShellSystem
                                                                                              • String ID: <
                                                                                              • API String ID: 893404051-4251816714
                                                                                              • Opcode ID: be62181711fdad770c23067a055a605ead6c89444dc6de91f0ff3b7559ccb240
                                                                                              • Instruction ID: 92df0b2f1231c5c49ece4c570041ef31d6ed92e86db86b93cafb864a5026e18c
                                                                                              • Opcode Fuzzy Hash: be62181711fdad770c23067a055a605ead6c89444dc6de91f0ff3b7559ccb240
                                                                                              • Instruction Fuzzy Hash: 172167B0600609ABDB10EF65C8926AE7BE8AF44355F54403AFC44E7291D7789E49CB98
                                                                                              APIs
                                                                                              • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,)), ref: 004025C7
                                                                                              • RtlLeaveCriticalSection.KERNEL32(0049B420,0040263D), ref: 00402630
                                                                                                • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,0225C498,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                                                • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,0225C498,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                                                • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,0225C498,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                                                • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,0225C498,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                                                                              • String ID: )
                                                                                              • API String ID: 2227675388-1084416617
                                                                                              • Opcode ID: 09cf32ac568926239da630a480ec85c7fe0e44c3c7351229851fbcf18ccaddb2
                                                                                              • Instruction ID: 77bd95ba853a3ee3b707a504883d316aad751082ca23ba06a0d8aa2ba3da16af
                                                                                              • Opcode Fuzzy Hash: 09cf32ac568926239da630a480ec85c7fe0e44c3c7351229851fbcf18ccaddb2
                                                                                              • Instruction Fuzzy Hash: E11104317042046FEB15AB796F5962B6AD4D795758B24087FF404F33D2DABD8C02929C
                                                                                              APIs
                                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 00496B69
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window
                                                                                              • String ID: /INITPROCWND=$%x $@
                                                                                              • API String ID: 2353593579-4169826103
                                                                                              • Opcode ID: 065ab22c92abacbd348a857e8389b224364e1a84b4d72130b6d36c29b0d142f9
                                                                                              • Instruction ID: 88b10d18150c6b9811cea3f3864e76c9cf3cbfb68c265b437af87b1fefc14b87
                                                                                              • Opcode Fuzzy Hash: 065ab22c92abacbd348a857e8389b224364e1a84b4d72130b6d36c29b0d142f9
                                                                                              • Instruction Fuzzy Hash: A3117231A042489FDF01DBA4E855BAEBFE8EB49314F51847BE504E7292EB3CA905C658
                                                                                              APIs
                                                                                                • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                                • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                              • SysFreeString.OLEAUT32(?), ref: 004474C6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: String$AllocByteCharFreeMultiWide
                                                                                              • String ID: NIL Interface Exception$Unknown Method
                                                                                              • API String ID: 3952431833-1023667238
                                                                                              • Opcode ID: eaaa5532a95bbaa63f0b72a9291e33775e11d622c6162567185e6fee38e986d8
                                                                                              • Instruction ID: eb0132878ffe7144b3db707554455947565e11d0cdd4dc78092451a8fec87e99
                                                                                              • Opcode Fuzzy Hash: eaaa5532a95bbaa63f0b72a9291e33775e11d622c6162567185e6fee38e986d8
                                                                                              • Instruction Fuzzy Hash: 8011B9706082089FEB10DFA58C52A6EBBBCEB09704F91407AF504F7681D77C9D01CB69
                                                                                              APIs
                                                                                              • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00496468,?,0049645C,00000000,00496443), ref: 0049640E
                                                                                              • CloseHandle.KERNEL32(004964A8,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00496468,?,0049645C,00000000), ref: 00496425
                                                                                                • Part of subcall function 004962F8: GetLastError.KERNEL32(00000000,00496390,?,?,?,?), ref: 0049631C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseCreateErrorHandleLastProcess
                                                                                              • String ID: 0nI
                                                                                              • API String ID: 3798668922-794067871
                                                                                              • Opcode ID: 9f8f3e3bd8d813766f30c87d8e8bb38219208be6823d56de1360ae23e0f090d4
                                                                                              • Instruction ID: 4379268ebcebee96409867e54b2437a6ba0b21f89d1dc4ba20584320bf55fb87
                                                                                              • Opcode Fuzzy Hash: 9f8f3e3bd8d813766f30c87d8e8bb38219208be6823d56de1360ae23e0f090d4
                                                                                              • Instruction Fuzzy Hash: 840182B1644248AFDB00EBD1DC42A9EBBACDF08704F51403AB904E7281D6785E008A2D
                                                                                              APIs
                                                                                              • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042DD78
                                                                                              • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042DDB8
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Value$EnumQuery
                                                                                              • String ID: Inno Setup: No Icons
                                                                                              • API String ID: 1576479698-2016326496
                                                                                              • Opcode ID: 36a0b08f46d91d09f38f531e186592c2a543f82488f0210131226a48688c00be
                                                                                              • Instruction ID: 8d080c6700cf8453afd411d185ff7d2dd707f59376968ad674d2e7d16536e1ed
                                                                                              • Opcode Fuzzy Hash: 36a0b08f46d91d09f38f531e186592c2a543f82488f0210131226a48688c00be
                                                                                              • Instruction Fuzzy Hash: 1B012B33B55B7179FB3045256D01F7B57889B82B60F64013BF942EA2C0D6999C04936E
                                                                                              APIs
                                                                                              • SetFileAttributesA.KERNEL32(00000000,?,00000000,00452EE9,?,?,-00000001,?), ref: 00452EC3
                                                                                              • GetLastError.KERNEL32(00000000,?,00000000,00452EE9,?,?,-00000001,?), ref: 00452ECB
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: AttributesErrorFileLast
                                                                                              • String ID: T$H
                                                                                              • API String ID: 1799206407-488339322
                                                                                              • Opcode ID: 164a1123582fd7f8b9629d9128a54c78742dfc935cb603b92947040143095295
                                                                                              • Instruction ID: d2ab7b9b66ca24062e77e49c95e81f13ab46b8af1b1b2eb811bbb53637dcbd2b
                                                                                              • Opcode Fuzzy Hash: 164a1123582fd7f8b9629d9128a54c78742dfc935cb603b92947040143095295
                                                                                              • Instruction Fuzzy Hash: 86F0F971A04204AB8B01DB7A9D4249EB7ECEB8A32171045BBFC04E3642E7B84E048558
                                                                                              APIs
                                                                                              • DeleteFileA.KERNEL32(00000000,00000000,00452965,?,-00000001,?), ref: 0045293F
                                                                                              • GetLastError.KERNEL32(00000000,00000000,00452965,?,-00000001,?), ref: 00452947
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: DeleteErrorFileLast
                                                                                              • String ID: T$H
                                                                                              • API String ID: 2018770650-488339322
                                                                                              • Opcode ID: 54a576a396afaa571a066345412aacc20c83a6c328a38e41dddb38150347ef46
                                                                                              • Instruction ID: a1d21d86fbcf93c7076efe682877c1f84c37cf58088428800e153654eea74c02
                                                                                              • Opcode Fuzzy Hash: 54a576a396afaa571a066345412aacc20c83a6c328a38e41dddb38150347ef46
                                                                                              • Instruction Fuzzy Hash: 05F0C2B2B04608ABDB01EFB59D414AEB7E8EB4E315B6045B7FC04E3742E6B85E148598
                                                                                              APIs
                                                                                              • RemoveDirectoryA.KERNEL32(00000000,00000000,00452E6D,?,-00000001,00000000), ref: 00452E47
                                                                                              • GetLastError.KERNEL32(00000000,00000000,00452E6D,?,-00000001,00000000), ref: 00452E4F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: DirectoryErrorLastRemove
                                                                                              • String ID: T$H
                                                                                              • API String ID: 377330604-488339322
                                                                                              • Opcode ID: f20199e737e539a63e7b44ed2747663bd9db8366f39d7150388d1a26e91210d5
                                                                                              • Instruction ID: a8b2bafe79397aca91686f8656b478e2385adfe3b855dfce5f6cc0b9ba314abc
                                                                                              • Opcode Fuzzy Hash: f20199e737e539a63e7b44ed2747663bd9db8366f39d7150388d1a26e91210d5
                                                                                              • Instruction Fuzzy Hash: 70F0FC71A04708AFCF01EF759D4249EB7E8DB4E31575049B7FC14E3642E7785E048598
                                                                                              APIs
                                                                                                • Part of subcall function 0047D0CC: FreeLibrary.KERNEL32(73BE0000,00481A2F), ref: 0047D0E2
                                                                                                • Part of subcall function 0047CD9C: GetTickCount.KERNEL32 ref: 0047CDE6
                                                                                                • Part of subcall function 00457294: SendMessageA.USER32(00000000,00000B01,00000000,00000000), ref: 004572B3
                                                                                              • GetCurrentProcess.KERNEL32(00000001,?,?,?,?,0049895B), ref: 00498059
                                                                                              • TerminateProcess.KERNEL32(00000000,00000001,?,?,?,?,0049895B), ref: 0049805F
                                                                                              Strings
                                                                                              • Detected restart. Removing temporary directory., xrefs: 00498013
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$CountCurrentFreeLibraryMessageSendTerminateTick
                                                                                              • String ID: Detected restart. Removing temporary directory.
                                                                                              • API String ID: 1717587489-3199836293
                                                                                              • Opcode ID: 281135f9a0ad5b4e488772808dcd9eaa6bf3b34c39f962a9f46887a4a11e3304
                                                                                              • Instruction ID: bb05712aa7eb36d303e19ffab6eef2c78f2a463723ea7eca767f41585c441369
                                                                                              • Opcode Fuzzy Hash: 281135f9a0ad5b4e488772808dcd9eaa6bf3b34c39f962a9f46887a4a11e3304
                                                                                              • Instruction Fuzzy Hash: BDE0E532208A406DDA1177BABC1396B7F5CDB46768B22487FF50882552D92D481CC53D
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000001.00000002.2545091419.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000001.00000002.2545008967.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545268697.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545294512.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545313758.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                              • Associated: 00000001.00000002.2545336673.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLastSleep
                                                                                              • String ID:
                                                                                              • API String ID: 1458359878-0
                                                                                              • Opcode ID: 1a9f46df8411143c40a07a37eb8806f02fdea1552ea3146ec5e635b784cd6770
                                                                                              • Instruction ID: f31041694d7e6b08a2ea33ec2b58b28b25921f40701f973673b956735a8b67d8
                                                                                              • Opcode Fuzzy Hash: 1a9f46df8411143c40a07a37eb8806f02fdea1552ea3146ec5e635b784cd6770
                                                                                              • Instruction Fuzzy Hash: 42F02B32705F58A78B21B56A889157FB2A8DB81366750012BFC0CD7313C878CC058BBC

                                                                                              Execution Graph

                                                                                              Execution Coverage:2.6%
                                                                                              Dynamic/Decrypted Code Coverage:68.9%
                                                                                              Signature Coverage:18.3%
                                                                                              Total number of Nodes:476
                                                                                              Total number of Limit Nodes:22
                                                                                              execution_graph 61565 4016c2 61566 40d82a RegOpenKeyExA 61565->61566 61567 40d543 CreateDirectoryA 61568 40ddb4 61567->61568 61569 401848 61570 402073 lstrcmpiW 61569->61570 61571 402084 61570->61571 61572 2c8f503 61573 2c8fbf7 WriteFile 61572->61573 61575 2c3104d 61580 2c423a4 61575->61580 61586 2c422a8 61580->61586 61582 2c31057 61583 2c31aa9 InterlockedIncrement 61582->61583 61584 2c31ac5 WSAStartup InterlockedExchange 61583->61584 61585 2c3105c 61583->61585 61584->61585 61587 2c422b4 _flsall 61586->61587 61594 2c47140 61587->61594 61593 2c422db _flsall 61593->61582 61611 2c4749b 61594->61611 61596 2c422bd 61597 2c422ec RtlDecodePointer RtlDecodePointer 61596->61597 61598 2c42319 61597->61598 61599 2c422c9 61597->61599 61598->61599 61620 2c47d0d 60 API calls __stricmp_l 61598->61620 61608 2c422e6 61599->61608 61601 2c4237c RtlEncodePointer RtlEncodePointer 61601->61599 61602 2c4232b 61602->61601 61604 2c42350 61602->61604 61621 2c476a9 62 API calls 2 library calls 61602->61621 61604->61599 61606 2c4236a RtlEncodePointer 61604->61606 61622 2c476a9 62 API calls 2 library calls 61604->61622 61606->61601 61607 2c42364 61607->61599 61607->61606 61623 2c47149 61608->61623 61612 2c474ac 61611->61612 61613 2c474bf RtlEnterCriticalSection 61611->61613 61618 2c47523 59 API calls 10 library calls 61612->61618 61613->61596 61615 2c474b2 61615->61613 61619 2c46fed 59 API calls 3 library calls 61615->61619 61618->61615 61620->61602 61621->61604 61622->61607 61626 2c47605 RtlLeaveCriticalSection 61623->61626 61625 2c422eb 61625->61593 61626->61625 61627 4016ce 61628 4016f7 GetStartupInfoA 61627->61628 61630 4016ee 61627->61630 61629 4020db 61628->61629 61630->61629 61632 401301 FindResourceA 61630->61632 61633 401367 SizeofResource 61632->61633 61638 401360 61632->61638 61634 401386 LoadResource LockResource GlobalAlloc 61633->61634 61633->61638 61635 4013cc 61634->61635 61636 40141f GetTickCount 61635->61636 61639 40142a GlobalAlloc 61636->61639 61638->61629 61639->61638 61640 401ed1 CopyFileA 61641 401ed7 OpenSCManagerA 61640->61641 61643 4021f2 61641->61643 61644 2c6c594 61645 2c6c598 61644->61645 61648 2c3e8a2 CreateFileA 61645->61648 61649 2c3e99e 61648->61649 61653 2c3e8d3 61648->61653 61650 2c3e8eb DeviceIoControl 61650->61653 61651 2c3e994 CloseHandle 61651->61649 61652 2c3e960 GetLastError 61652->61651 61652->61653 61653->61650 61653->61651 61653->61652 61655 2c427b5 61653->61655 61658 2c427bd 61655->61658 61657 2c427d7 61657->61653 61658->61657 61660 2c427db std::exception::exception 61658->61660 61663 2c41fac 61658->61663 61680 2c46e63 RtlDecodePointer 61658->61680 61681 2c431ba RaiseException 61660->61681 61662 2c42805 61664 2c42027 61663->61664 61678 2c41fb8 61663->61678 61688 2c46e63 RtlDecodePointer 61664->61688 61666 2c4202d 61689 2c44abb 59 API calls __getptd_noexit 61666->61689 61667 2c41fc3 61667->61678 61682 2c47281 59 API calls __NMSG_WRITE 61667->61682 61683 2c472de 59 API calls 7 library calls 61667->61683 61684 2c46eca GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 61667->61684 61670 2c41feb RtlAllocateHeap 61672 2c4201f 61670->61672 61670->61678 61672->61658 61673 2c42013 61686 2c44abb 59 API calls __getptd_noexit 61673->61686 61677 2c42011 61687 2c44abb 59 API calls __getptd_noexit 61677->61687 61678->61667 61678->61670 61678->61673 61678->61677 61685 2c46e63 RtlDecodePointer 61678->61685 61680->61658 61681->61662 61682->61667 61683->61667 61685->61678 61686->61677 61687->61672 61688->61666 61689->61672 61690 40d212 RegCloseKey 61691 2cbea5c 61692 2cccaac InternetReadFile 61691->61692 61693 2ccea6c 61692->61693 61694 401859 lstrcmpiW 61695 4018b3 61694->61695 61696 2c35e59 61697 2c35e5f RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 61696->61697 61767 2c342c7 61697->61767 61699 2c35ec6 GetTickCount 61700 2c359f4 59 API calls 61699->61700 61701 2c35ee3 GetVersionExA 61700->61701 61702 2c35f24 _memset 61701->61702 61703 2c41fac _malloc 59 API calls 61702->61703 61704 2c35f31 61703->61704 61705 2c41fac _malloc 59 API calls 61704->61705 61706 2c35f41 61705->61706 61707 2c41fac _malloc 59 API calls 61706->61707 61708 2c35f4c 61707->61708 61709 2c41fac _malloc 59 API calls 61708->61709 61710 2c35f57 61709->61710 61711 2c41fac _malloc 59 API calls 61710->61711 61712 2c35f62 61711->61712 61713 2c41fac _malloc 59 API calls 61712->61713 61714 2c35f6d 61713->61714 61715 2c41fac _malloc 59 API calls 61714->61715 61716 2c35f78 61715->61716 61717 2c41fac _malloc 59 API calls 61716->61717 61718 2c35f84 6 API calls 61717->61718 61719 2c35fd1 _memset 61718->61719 61720 2c35fea RtlEnterCriticalSection RtlLeaveCriticalSection 61719->61720 61721 2c41fac _malloc 59 API calls 61720->61721 61722 2c36026 61721->61722 61723 2c41fac _malloc 59 API calls 61722->61723 61724 2c36034 61723->61724 61725 2c41fac _malloc 59 API calls 61724->61725 61726 2c3603b 61725->61726 61727 2c41fac _malloc 59 API calls 61726->61727 61728 2c3605c QueryPerformanceCounter Sleep 61727->61728 61729 2c41fac _malloc 59 API calls 61728->61729 61730 2c36082 61729->61730 61731 2c41fac _malloc 59 API calls 61730->61731 61758 2c36092 _memset 61731->61758 61732 2c360ff Sleep 61733 2c36105 RtlEnterCriticalSection RtlLeaveCriticalSection 61732->61733 61733->61758 61734 2c3649a RtlLeaveCriticalSection 61735 2c4133c 66 API calls 61734->61735 61735->61758 61736 2c41fac _malloc 59 API calls 61737 2c3653b RtlEnterCriticalSection RtlLeaveCriticalSection 61736->61737 61737->61758 61738 2c4133c 66 API calls 61738->61758 61739 2c367f2 RtlEnterCriticalSection RtlLeaveCriticalSection 61739->61758 61740 2c35c0c 59 API calls 61740->61758 61741 2c41418 _sprintf 82 API calls 61741->61758 61742 2c31ba7 210 API calls 61742->61758 61743 2c36957 RtlEnterCriticalSection 61744 2c36984 RtlLeaveCriticalSection 61743->61744 61743->61758 61746 2c33c67 72 API calls 61744->61746 61745 2c41fac _malloc 59 API calls 61745->61758 61746->61758 61747 2c33d7e 64 API calls 61747->61758 61748 2c37336 89 API calls 61748->61758 61749 2c37fff 88 API calls 61749->61758 61750 2c41f74 _free 59 API calls 61750->61758 61751 2c373e5 71 API calls 61751->61758 61752 2c427b5 _Allocate 60 API calls 61752->61758 61753 2c41850 _swscanf 59 API calls 61753->61758 61754 2c333b2 86 API calls 61754->61758 61755 2c38733 212 API calls 61755->61758 61756 2c3984b 60 API calls 61756->61758 61757 2c425e6 65 API calls _strtok 61757->61758 61758->61732 61758->61733 61758->61734 61758->61736 61758->61738 61758->61739 61758->61740 61758->61741 61758->61742 61758->61743 61758->61744 61758->61745 61758->61747 61758->61748 61758->61749 61758->61750 61758->61751 61758->61752 61758->61753 61758->61754 61758->61755 61758->61756 61758->61757 61758->61758 61759 2c39721 73 API calls 61758->61759 61760 2c35119 103 API calls 61758->61760 61761 2c3c113 73 API calls 61758->61761 61762 2c39c0b 210 API calls 61758->61762 61763 2c3676f Sleep 61758->61763 61765 2c3676a shared_ptr 61758->61765 61759->61758 61760->61758 61761->61758 61762->61758 61764 2c408f0 GetProcessHeap HeapFree 61763->61764 61764->61765 61765->61758 61765->61763 61766 2c34100 GetProcessHeap HeapFree 61765->61766 61766->61765 61768 40d31b RegQueryValueExA 61769 40dc9c 61770 40dd00 VirtualAlloc 61769->61770 61771 40dc9f 61769->61771 61771->61770 61772 401d9d RegCreateKeyExA 61776 401bdf 61777 401cf5 RegCloseKey 61776->61777 61778 40209c 61777->61778 61779 402a20 GetVersion 61803 403b64 HeapCreate 61779->61803 61781 402a7f 61782 402a84 61781->61782 61783 402a8c 61781->61783 61878 402b3b 8 API calls 61782->61878 61815 403844 61783->61815 61787 402a94 GetCommandLineA 61829 403712 61787->61829 61791 402aae 61861 40340c 61791->61861 61793 402ab3 61794 402ab8 GetStartupInfoA 61793->61794 61874 4033b4 61794->61874 61796 402aca GetModuleHandleA 61798 402aee 61796->61798 61879 40315b GetCurrentProcess TerminateProcess ExitProcess 61798->61879 61800 402af7 61880 403230 UnhandledExceptionFilter 61800->61880 61802 402b08 61804 403b84 61803->61804 61805 403bba 61803->61805 61881 403a1c 19 API calls 61804->61881 61805->61781 61807 403b89 61808 403ba0 61807->61808 61809 403b93 61807->61809 61810 403bbd 61808->61810 61883 40478c HeapAlloc VirtualAlloc VirtualAlloc VirtualFree HeapFree 61808->61883 61882 403f3b HeapAlloc 61809->61882 61810->61781 61813 403b9d 61813->61810 61814 403bae HeapDestroy 61813->61814 61814->61805 61884 402b5f 61815->61884 61818 403863 GetStartupInfoA 61826 4038af 61818->61826 61827 403974 61818->61827 61821 4039db SetHandleCount 61821->61787 61822 40399b GetStdHandle 61825 4039a9 GetFileType 61822->61825 61822->61827 61823 403920 61823->61827 61828 403942 GetFileType 61823->61828 61824 402b5f 12 API calls 61824->61826 61825->61827 61826->61823 61826->61824 61826->61827 61827->61821 61827->61822 61828->61823 61830 403760 61829->61830 61831 40372d GetEnvironmentStringsW 61829->61831 61832 403735 61830->61832 61833 403751 61830->61833 61831->61832 61834 403741 GetEnvironmentStrings 61831->61834 61836 403779 WideCharToMultiByte 61832->61836 61837 40376d GetEnvironmentStringsW 61832->61837 61835 402aa4 61833->61835 61838 4037f3 GetEnvironmentStrings 61833->61838 61839 4037ff 61833->61839 61834->61833 61834->61835 61852 4034c5 61835->61852 61841 4037ad 61836->61841 61842 4037df FreeEnvironmentStringsW 61836->61842 61837->61835 61837->61836 61838->61835 61838->61839 61843 402b5f 12 API calls 61839->61843 61844 402b5f 12 API calls 61841->61844 61842->61835 61850 40381a 61843->61850 61845 4037b3 61844->61845 61845->61842 61846 4037bc WideCharToMultiByte 61845->61846 61848 4037d6 61846->61848 61849 4037cd 61846->61849 61847 403830 FreeEnvironmentStringsA 61847->61835 61848->61842 61893 402c11 61849->61893 61850->61847 61853 4034d7 61852->61853 61854 4034dc GetModuleFileNameA 61852->61854 61906 405d24 19 API calls 61853->61906 61856 4034ff 61854->61856 61857 402b5f 12 API calls 61856->61857 61858 403520 61857->61858 61860 403530 61858->61860 61907 402b16 7 API calls 61858->61907 61860->61791 61862 403419 61861->61862 61864 40341e 61861->61864 61908 405d24 19 API calls 61862->61908 61865 402b5f 12 API calls 61864->61865 61866 40344b 61865->61866 61873 40345f 61866->61873 61909 402b16 7 API calls 61866->61909 61868 4034a2 61869 402c11 7 API calls 61868->61869 61870 4034ae 61869->61870 61870->61793 61871 402b5f 12 API calls 61871->61873 61873->61868 61873->61871 61910 402b16 7 API calls 61873->61910 61875 4033bd 61874->61875 61877 4033c2 61874->61877 61911 405d24 19 API calls 61875->61911 61877->61796 61879->61800 61880->61802 61881->61807 61882->61813 61883->61813 61888 402b71 61884->61888 61887 402b16 7 API calls 61887->61818 61889 402b6e 61888->61889 61891 402b78 61888->61891 61889->61818 61889->61887 61891->61889 61892 402b9d 12 API calls 61891->61892 61892->61891 61894 402c1d 61893->61894 61903 402c39 61893->61903 61896 402c3d 61894->61896 61898 402c27 61894->61898 61895 402c68 61897 402c69 HeapFree 61895->61897 61896->61895 61900 402c57 61896->61900 61897->61903 61898->61897 61899 402c33 61898->61899 61904 403fae VirtualFree VirtualFree HeapFree 61899->61904 61905 404a3f VirtualFree HeapFree VirtualFree 61900->61905 61903->61848 61904->61903 61905->61903 61906->61854 61907->61860 61908->61864 61909->61873 61910->61873 61911->61877 61912 4020a2 61913 4020b7 CopyFileA 61912->61913 61915 401d63 61919 2c42978 61915->61919 61917 40dd82 61920 2c42986 61919->61920 61921 2c42981 61919->61921 61925 2c4299b 61920->61925 61933 2c4917c GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 61921->61933 61924 401d6c Sleep 61924->61917 61926 2c429a7 _flsall 61925->61926 61930 2c429f5 ___DllMainCRTStartup 61926->61930 61932 2c42a52 _flsall 61926->61932 61934 2c42806 61926->61934 61928 2c42a2f 61929 2c42806 __CRT_INIT@12 138 API calls 61928->61929 61928->61932 61929->61932 61930->61928 61931 2c42806 __CRT_INIT@12 138 API calls 61930->61931 61930->61932 61931->61928 61932->61924 61933->61920 61935 2c42812 _flsall 61934->61935 61936 2c42894 61935->61936 61937 2c4281a 61935->61937 61938 2c428fd 61936->61938 61939 2c42898 61936->61939 61982 2c46e46 GetProcessHeap 61937->61982 61942 2c42960 61938->61942 61943 2c42902 61938->61943 61945 2c428b9 61939->61945 61975 2c42823 _flsall __CRT_INIT@12 61939->61975 62071 2c47009 59 API calls _doexit 61939->62071 61941 2c4281f 61941->61975 61983 2c449f4 61941->61983 61942->61975 62102 2c44884 59 API calls 2 library calls 61942->62102 62076 2c47d7b 61943->62076 62072 2c46ee0 61 API calls _free 61945->62072 61948 2c4290d 61948->61975 62079 2c4761a 61948->62079 61951 2c4282f __RTC_Initialize 61959 2c4283f GetCommandLineA 61951->61959 61951->61975 61952 2c428be 61954 2c428cf __CRT_INIT@12 61952->61954 62073 2c48e1a 60 API calls _free 61952->62073 62075 2c428e8 62 API calls __mtterm 61954->62075 61958 2c428ca 62074 2c44a6a 62 API calls 2 library calls 61958->62074 62004 2c49218 GetEnvironmentStringsW 61959->62004 61963 2c42936 61965 2c42954 61963->61965 61966 2c4293c 61963->61966 62096 2c41f74 61965->62096 62086 2c44941 61966->62086 61970 2c42859 61972 2c4285d 61970->61972 62036 2c48e6c 61970->62036 61971 2c42944 GetCurrentThreadId 61971->61975 62069 2c44a6a 62 API calls 2 library calls 61972->62069 61975->61930 61977 2c4287d 61977->61975 62070 2c48e1a 60 API calls _free 61977->62070 61982->61941 62103 2c470b0 36 API calls 2 library calls 61983->62103 61985 2c449f9 62104 2c475cc InitializeCriticalSectionAndSpinCount __mtinitlocks 61985->62104 61987 2c449fe 61988 2c44a02 61987->61988 62106 2c47d3e TlsAlloc 61987->62106 62105 2c44a6a 62 API calls 2 library calls 61988->62105 61991 2c44a07 61991->61951 61992 2c44a14 61992->61988 61993 2c44a1f 61992->61993 61994 2c4761a __calloc_crt 59 API calls 61993->61994 61995 2c44a2c 61994->61995 61996 2c44a61 61995->61996 62107 2c47d9a TlsSetValue 61995->62107 62108 2c44a6a 62 API calls 2 library calls 61996->62108 61999 2c44a40 61999->61996 62001 2c44a46 61999->62001 62000 2c44a66 62000->61951 62002 2c44941 __initptd 59 API calls 62001->62002 62003 2c44a4e GetCurrentThreadId 62002->62003 62003->61951 62005 2c4284f 62004->62005 62006 2c4922b WideCharToMultiByte 62004->62006 62017 2c48b66 62005->62017 62008 2c49295 FreeEnvironmentStringsW 62006->62008 62009 2c4925e 62006->62009 62008->62005 62109 2c47662 59 API calls 2 library calls 62009->62109 62011 2c49264 62011->62008 62012 2c4926b WideCharToMultiByte 62011->62012 62013 2c49281 62012->62013 62014 2c4928a FreeEnvironmentStringsW 62012->62014 62015 2c41f74 _free 59 API calls 62013->62015 62014->62005 62016 2c49287 62015->62016 62016->62014 62018 2c48b72 _flsall 62017->62018 62019 2c4749b __lock 59 API calls 62018->62019 62020 2c48b79 62019->62020 62021 2c4761a __calloc_crt 59 API calls 62020->62021 62022 2c48b8a 62021->62022 62023 2c48bf5 GetStartupInfoW 62022->62023 62024 2c48b95 _flsall @_EH4_CallFilterFunc@8 62022->62024 62030 2c48d39 62023->62030 62032 2c48c0a 62023->62032 62024->61970 62025 2c48e01 62112 2c48e11 RtlLeaveCriticalSection _doexit 62025->62112 62026 2c48c58 62026->62030 62033 2c48c8c GetFileType 62026->62033 62110 2c47dbc InitializeCriticalSectionAndSpinCount 62026->62110 62028 2c4761a __calloc_crt 59 API calls 62028->62032 62029 2c48d86 GetStdHandle 62029->62030 62030->62025 62030->62029 62031 2c48d99 GetFileType 62030->62031 62111 2c47dbc InitializeCriticalSectionAndSpinCount 62030->62111 62031->62030 62032->62026 62032->62028 62032->62030 62033->62026 62037 2c48e7f GetModuleFileNameA 62036->62037 62038 2c48e7a 62036->62038 62040 2c48eac 62037->62040 62119 2c43eea 71 API calls __setmbcp 62038->62119 62113 2c48f1f 62040->62113 62042 2c42869 62042->61977 62047 2c4909b 62042->62047 62045 2c48ee5 62045->62042 62046 2c48f1f _parse_cmdline 59 API calls 62045->62046 62046->62042 62048 2c490a4 62047->62048 62050 2c490a9 _strlen 62047->62050 62123 2c43eea 71 API calls __setmbcp 62048->62123 62051 2c4761a __calloc_crt 59 API calls 62050->62051 62054 2c42872 62050->62054 62059 2c490df _strlen 62051->62059 62052 2c49131 62053 2c41f74 _free 59 API calls 62052->62053 62053->62054 62054->61977 62063 2c47018 62054->62063 62055 2c4761a __calloc_crt 59 API calls 62055->62059 62056 2c49158 62058 2c41f74 _free 59 API calls 62056->62058 62058->62054 62059->62052 62059->62054 62059->62055 62059->62056 62060 2c4916f 62059->62060 62124 2c4591c 59 API calls __stricmp_l 62059->62124 62125 2c43b65 8 API calls 2 library calls 62060->62125 62062 2c4917b 62065 2c47024 __IsNonwritableInCurrentImage 62063->62065 62126 2c4ab7f 62065->62126 62066 2c47042 __initterm_e 62067 2c423a4 __cinit 68 API calls 62066->62067 62068 2c47061 _doexit __IsNonwritableInCurrentImage 62066->62068 62067->62068 62068->61977 62069->61975 62070->61972 62071->61945 62072->61952 62073->61958 62074->61954 62075->61975 62077 2c47d92 TlsGetValue 62076->62077 62078 2c47d8e 62076->62078 62077->61948 62078->61948 62081 2c47621 62079->62081 62082 2c4291e 62081->62082 62084 2c4763f 62081->62084 62129 2c4e9a8 62081->62129 62082->61975 62085 2c47d9a TlsSetValue 62082->62085 62084->62081 62084->62082 62137 2c480b7 Sleep 62084->62137 62085->61963 62087 2c4494d _flsall 62086->62087 62088 2c4749b __lock 59 API calls 62087->62088 62089 2c4498a 62088->62089 62140 2c449e2 62089->62140 62092 2c4749b __lock 59 API calls 62093 2c449ab ___addlocaleref 62092->62093 62143 2c449eb 62093->62143 62095 2c449d6 _flsall 62095->61971 62097 2c41f7d HeapFree 62096->62097 62098 2c41fa6 __dosmaperr 62096->62098 62097->62098 62099 2c41f92 62097->62099 62098->61975 62148 2c44abb 59 API calls __getptd_noexit 62099->62148 62101 2c41f98 GetLastError 62101->62098 62102->61975 62103->61985 62104->61987 62105->61991 62106->61992 62107->61999 62108->62000 62109->62011 62110->62026 62111->62030 62112->62024 62115 2c48f41 62113->62115 62118 2c48fa5 62115->62118 62121 2c4ef86 59 API calls x_ismbbtype_l 62115->62121 62116 2c48ec2 62116->62042 62120 2c47662 59 API calls 2 library calls 62116->62120 62118->62116 62122 2c4ef86 59 API calls x_ismbbtype_l 62118->62122 62119->62037 62120->62045 62121->62115 62122->62118 62123->62050 62124->62059 62125->62062 62127 2c4ab82 RtlEncodePointer 62126->62127 62127->62127 62128 2c4ab9c 62127->62128 62128->62066 62130 2c4e9b3 62129->62130 62136 2c4e9ce 62129->62136 62131 2c4e9bf 62130->62131 62130->62136 62138 2c44abb 59 API calls __getptd_noexit 62131->62138 62133 2c4e9de RtlAllocateHeap 62134 2c4e9c4 62133->62134 62133->62136 62134->62081 62136->62133 62136->62134 62139 2c46e63 RtlDecodePointer 62136->62139 62137->62084 62138->62134 62139->62136 62146 2c47605 RtlLeaveCriticalSection 62140->62146 62142 2c449a4 62142->62092 62147 2c47605 RtlLeaveCriticalSection 62143->62147 62145 2c449f2 62145->62095 62146->62142 62147->62145 62148->62101 62149 401b65 Sleep 62150 40d953 62149->62150 62151 2c8ffef 62152 2c9cb0a DeleteFileA 62151->62152 62153 40d32d GetModuleHandleA 62154 40dd48 GetModuleFileNameA 62153->62154 62155 4016b9 62156 40d6e6 RegSetValueExA 62155->62156 62158 4017ba LoadLibraryExA 62159 4017d2 62158->62159 62160 2c6cdbd 62161 2c6cd4a 62160->62161 62165 2c3e9a6 LoadLibraryA 62161->62165 62162 2ccf1f7 62164 2c3e9a6 64 API calls 62162->62164 62164->62162 62166 2c3ea89 62165->62166 62167 2c3e9cf GetProcAddress 62165->62167 62166->62162 62168 2c3ea82 FreeLibrary 62167->62168 62171 2c3e9e3 62167->62171 62168->62166 62169 2c3e9f5 GetAdaptersInfo 62169->62171 62170 2c3ea7d 62170->62168 62171->62169 62171->62170 62171->62171 62172 2c427b5 _Allocate 60 API calls 62171->62172 62172->62171 62173 4023fb 62174 40d38a 62173->62174 62175 40d38f ExitProcess 62174->62175 62176 2c7b47b ReadFile 62177 2cbcd13 62176->62177

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 222 2c35e59-2c360e7 RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress call 2c342c7 GetTickCount call 2c359f4 GetVersionExA call 2c43750 call 2c41fac * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2c43750 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c41fac * 4 QueryPerformanceCounter Sleep call 2c41fac * 2 call 2c43750 * 2 268 2c360eb-2c360ed 222->268 269 2c360f6-2c360f8 268->269 270 2c360ef-2c360f4 268->270 272 2c36105-2c36422 RtlEnterCriticalSection RtlLeaveCriticalSection 269->272 273 2c360fa 269->273 271 2c360ff Sleep 270->271 271->272 275 2c36424-2c36427 272->275 276 2c3649a-2c364c4 RtlLeaveCriticalSection call 2c4133c 272->276 273->271 275->276 279 2c364c6-2c364d5 call 2c4133c 276->279 280 2c3650e-2c36526 call 2c4133c 276->280 279->280 287 2c364d7-2c364e6 call 2c4133c 279->287 285 2c367cd-2c367dc call 2c4133c 280->285 286 2c3652c-2c3652e 280->286 295 2c36821-2c36830 call 2c4133c 285->295 296 2c367de-2c367e0 285->296 286->285 290 2c36534-2c365df call 2c41fac RtlEnterCriticalSection RtlLeaveCriticalSection call 2c43750 * 5 call 2c3439c * 2 286->290 287->280 294 2c364e8-2c364f7 call 2c4133c 287->294 341 2c365e1-2c365e3 290->341 342 2c3661c 290->342 294->280 310 2c364f9-2c36508 call 2c4133c 294->310 308 2c36832-2c3683b call 2c35c0c call 2c35d1a 295->308 309 2c36845-2c36854 call 2c4133c 295->309 296->295 300 2c367e2-2c3681c call 2c43750 RtlEnterCriticalSection RtlLeaveCriticalSection 296->300 300->268 323 2c36840 308->323 309->268 321 2c3685a-2c3685c 309->321 310->268 310->280 321->268 324 2c36862-2c3687b call 2c3439c 321->324 323->268 324->268 329 2c36881-2c36950 call 2c41418 call 2c31ba7 324->329 339 2c36952 call 2c3143f 329->339 340 2c36957-2c36978 RtlEnterCriticalSection 329->340 339->340 345 2c36984-2c369eb RtlLeaveCriticalSection call 2c33c67 call 2c33d7e call 2c37336 340->345 346 2c3697a-2c36981 340->346 341->342 347 2c365e5-2c365f7 call 2c4133c 341->347 343 2c36620-2c3664e call 2c41fac call 2c43750 call 2c3439c 342->343 367 2c36650-2c3665f call 2c425e6 343->367 368 2c3668f-2c36698 call 2c41f74 343->368 365 2c36b53-2c36b67 call 2c37fff 345->365 366 2c369f1-2c36a33 call 2c39721 345->366 346->345 347->342 354 2c365f9-2c3661a call 2c3439c 347->354 354->343 365->268 377 2c36a39-2c36a40 366->377 378 2c36b1d-2c36b2e call 2c373e5 366->378 367->368 381 2c36661 367->381 379 2c367bb-2c367c8 368->379 380 2c3669e-2c366b6 call 2c427b5 368->380 384 2c36a43-2c36a48 377->384 387 2c36b33-2c36b4e call 2c333b2 378->387 379->268 393 2c366c2 380->393 394 2c366b8-2c366c0 call 2c38733 380->394 382 2c36666-2c36678 call 2c41850 381->382 396 2c3667a 382->396 397 2c3667d-2c3668d call 2c425e6 382->397 384->384 388 2c36a4a-2c36a8f call 2c39721 384->388 387->365 388->378 402 2c36a95-2c36a9b 388->402 395 2c366c4-2c36752 call 2c3984b call 2c33863 call 2c35119 call 2c33863 call 2c39af1 call 2c39c0b 393->395 394->395 422 2c36757-2c36768 395->422 396->397 397->368 397->382 406 2c36a9e-2c36aa3 402->406 406->406 408 2c36aa5-2c36ae0 call 2c39721 406->408 408->378 414 2c36ae2-2c36b16 call 2c3c113 408->414 418 2c36b1b-2c36b1c 414->418 418->378 423 2c3676a call 2c3380b 422->423 424 2c3676f-2c3679a Sleep call 2c408f0 422->424 423->424 428 2c367a6-2c367b4 424->428 429 2c3679c-2c367a5 call 2c34100 424->429 428->379 431 2c367b6 call 2c3380b 428->431 429->428 431->379
                                                                                              APIs
                                                                                              • RtlInitializeCriticalSection.NTDLL(02C64FD0), ref: 02C35E8D
                                                                                              • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 02C35EA4
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 02C35EAD
                                                                                              • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02C35EBC
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 02C35EBF
                                                                                              • GetTickCount.KERNEL32 ref: 02C35ED3
                                                                                                • Part of subcall function 02C359F4: _malloc.LIBCMT ref: 02C35A02
                                                                                              • GetVersionExA.KERNEL32(02C64E20), ref: 02C35F00
                                                                                              • _memset.LIBCMT ref: 02C35F1F
                                                                                              • _malloc.LIBCMT ref: 02C35F2C
                                                                                                • Part of subcall function 02C41FAC: __FF_MSGBANNER.LIBCMT ref: 02C41FC3
                                                                                                • Part of subcall function 02C41FAC: __NMSG_WRITE.LIBCMT ref: 02C41FCA
                                                                                                • Part of subcall function 02C41FAC: RtlAllocateHeap.NTDLL(00920000,00000000,00000001), ref: 02C41FEF
                                                                                              • _malloc.LIBCMT ref: 02C35F3C
                                                                                              • _malloc.LIBCMT ref: 02C35F47
                                                                                              • _malloc.LIBCMT ref: 02C35F52
                                                                                              • _malloc.LIBCMT ref: 02C35F5D
                                                                                              • _malloc.LIBCMT ref: 02C35F68
                                                                                              • _malloc.LIBCMT ref: 02C35F73
                                                                                              • _malloc.LIBCMT ref: 02C35F7F
                                                                                              • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02C35F96
                                                                                              • RtlAllocateHeap.NTDLL(00000000), ref: 02C35F9F
                                                                                              • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02C35FAB
                                                                                              • RtlAllocateHeap.NTDLL(00000000), ref: 02C35FAE
                                                                                              • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02C35FB9
                                                                                              • RtlAllocateHeap.NTDLL(00000000), ref: 02C35FBC
                                                                                              • _memset.LIBCMT ref: 02C35FCC
                                                                                              • _memset.LIBCMT ref: 02C35FD8
                                                                                              • _memset.LIBCMT ref: 02C35FE5
                                                                                              • RtlEnterCriticalSection.NTDLL(02C64FD0), ref: 02C35FF3
                                                                                              • RtlLeaveCriticalSection.NTDLL(02C64FD0), ref: 02C36000
                                                                                              • _malloc.LIBCMT ref: 02C36021
                                                                                              • _malloc.LIBCMT ref: 02C3602F
                                                                                              • _malloc.LIBCMT ref: 02C36036
                                                                                              • _malloc.LIBCMT ref: 02C36057
                                                                                              • QueryPerformanceCounter.KERNEL32(00000200), ref: 02C36063
                                                                                              • Sleep.KERNEL32(00000000), ref: 02C36071
                                                                                              • _malloc.LIBCMT ref: 02C3607D
                                                                                              • _malloc.LIBCMT ref: 02C3608D
                                                                                              • _memset.LIBCMT ref: 02C360A2
                                                                                              • _memset.LIBCMT ref: 02C360B2
                                                                                              • Sleep.KERNEL32(0000EA60), ref: 02C360FF
                                                                                              • RtlEnterCriticalSection.NTDLL(02C64FD0), ref: 02C3610A
                                                                                              • RtlLeaveCriticalSection.NTDLL(02C64FD0), ref: 02C3611B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: _malloc$Heap$_memset$CriticalSection$Allocate$Process$AddressEnterHandleLeaveModuleProcSleep$CountCounterInitializePerformanceQueryTickVersion
                                                                                              • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$gpt=%.8x&advizor=%d&box=%d&hp=%x&lp=%x&line=%d&os=%d.%d.%04d&flag=%d&itd=%d$ntdll.dll$sprintf$strcat
                                                                                              • API String ID: 1856495841-1038016512
                                                                                              • Opcode ID: b20ff178cb305d86641b4acceae16741d3d4a1de6b371604d4d4795f36bd8aff
                                                                                              • Instruction ID: c9c3e3260863b774bc64c57d8902106c06aa9a8e7b8634fc4377ea0aceb0904d
                                                                                              • Opcode Fuzzy Hash: b20ff178cb305d86641b4acceae16741d3d4a1de6b371604d4d4795f36bd8aff
                                                                                              • Instruction Fuzzy Hash: 8271F7B1D483909FE320AF74AC49B5B7BD8AFC5350F140E19F588A7240DBB598518FD6

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 936 2c3e9a6-2c3e9c9 LoadLibraryA 937 2c3ea89-2c3ea90 936->937 938 2c3e9cf-2c3e9dd GetProcAddress 936->938 939 2c3e9e3-2c3e9f3 938->939 940 2c3ea82-2c3ea83 FreeLibrary 938->940 941 2c3e9f5-2c3ea01 GetAdaptersInfo 939->941 940->937 942 2c3ea03 941->942 943 2c3ea39-2c3ea41 941->943 946 2c3ea05-2c3ea0c 942->946 944 2c3ea43-2c3ea49 call 2c426cf 943->944 945 2c3ea4a-2c3ea4f 943->945 944->945 948 2c3ea51-2c3ea54 945->948 949 2c3ea7d-2c3ea81 945->949 950 2c3ea16-2c3ea1e 946->950 951 2c3ea0e-2c3ea12 946->951 948->949 953 2c3ea56-2c3ea5b 948->953 949->940 955 2c3ea21-2c3ea26 950->955 951->946 954 2c3ea14 951->954 956 2c3ea68-2c3ea73 call 2c427b5 953->956 957 2c3ea5d-2c3ea65 953->957 954->943 955->955 958 2c3ea28-2c3ea35 call 2c3e6f5 955->958 956->949 963 2c3ea75-2c3ea78 956->963 957->956 958->943 963->941
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 02C3E9BC
                                                                                              • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 02C3E9D5
                                                                                              • GetAdaptersInfo.IPHLPAPI(?,?), ref: 02C3E9FA
                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 02C3EA83
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                                              • String ID: GetAdaptersInfo$iphlpapi.dll
                                                                                              • API String ID: 514930453-3114217049
                                                                                              • Opcode ID: a69d35955378212297029d0bbca15a19556ff6fc9ed20476743344b159d646a7
                                                                                              • Instruction ID: 854668023e2a848b35dfb23966124e547418b96ce7160318f3abeebc7d8eabe2
                                                                                              • Opcode Fuzzy Hash: a69d35955378212297029d0bbca15a19556ff6fc9ed20476743344b159d646a7
                                                                                              • Instruction Fuzzy Hash: 5B21E171A442199BDB12DFA9C880AEEBFF8BF85304F1405A9E404E7201DB308E85CBA4

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1021 2c3e8a2-2c3e8cd CreateFileA 1022 2c3e8d3-2c3e8e8 1021->1022 1023 2c3e99e-2c3e9a5 1021->1023 1024 2c3e8eb-2c3e90d DeviceIoControl 1022->1024 1025 2c3e946-2c3e94e 1024->1025 1026 2c3e90f-2c3e917 1024->1026 1027 2c3e950-2c3e956 call 2c426cf 1025->1027 1028 2c3e957-2c3e959 1025->1028 1029 2c3e920-2c3e925 1026->1029 1030 2c3e919-2c3e91e 1026->1030 1027->1028 1033 2c3e994-2c3e99d CloseHandle 1028->1033 1034 2c3e95b-2c3e95e 1028->1034 1029->1025 1031 2c3e927-2c3e92f 1029->1031 1030->1025 1035 2c3e932-2c3e937 1031->1035 1033->1023 1037 2c3e960-2c3e969 GetLastError 1034->1037 1038 2c3e97a-2c3e987 call 2c427b5 1034->1038 1035->1035 1040 2c3e939-2c3e945 call 2c3e6f5 1035->1040 1037->1033 1041 2c3e96b-2c3e96e 1037->1041 1038->1033 1045 2c3e989-2c3e98f 1038->1045 1040->1025 1041->1038 1044 2c3e970-2c3e977 1041->1044 1044->1038 1045->1024
                                                                                              APIs
                                                                                              • CreateFileA.KERNEL32(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 02C3E8C1
                                                                                              • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000400,?,00000000), ref: 02C3E8FF
                                                                                              • GetLastError.KERNEL32 ref: 02C3E960
                                                                                              • CloseHandle.KERNEL32(?), ref: 02C3E997
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                                                              • String ID: \\.\PhysicalDrive0
                                                                                              • API String ID: 4026078076-1180397377
                                                                                              • Opcode ID: 3e8a79c6f0a8fb5155017919a29b89c6f9b26e80323ed3289148021a71094118
                                                                                              • Instruction ID: 470b6e8557cd8b10582fedacb7f4cc74028695db9966debd0ca9c05143c1f063
                                                                                              • Opcode Fuzzy Hash: 3e8a79c6f0a8fb5155017919a29b89c6f9b26e80323ed3289148021a71094118
                                                                                              • Instruction Fuzzy Hash: C231BE71D00329EBDB25CF99D884BEEBBB8EF84354F20096AE505A7280DB705B00CF90
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C68000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C68000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c68000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileInternetRead
                                                                                              • String ID:
                                                                                              • API String ID: 778332206-0
                                                                                              • Opcode ID: de5050fddb634ae417228810057bffa94d692f7b8edfdbcd21006c87169ee05a
                                                                                              • Instruction ID: 7f1a578876fa14b7362f02005b5c2621a712fff87b7ac4ffb59476a37d2eb8ca
                                                                                              • Opcode Fuzzy Hash: de5050fddb634ae417228810057bffa94d692f7b8edfdbcd21006c87169ee05a
                                                                                              • Instruction Fuzzy Hash: 50E0DFB385C629FFD3013E05DC443B8B6A4AB0A795F2B092ED78793600EA328940C7D7

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 0 2c35d7a-2c35d7d 1 2c35df4 0->1 2 2c35dea-2c35deb 0->2 3 2c35df6-2c35e03 1->3 4 2c35e19-2c35e1a 2->4 5 2c35ded-2c35df2 2->5 6 2c35e15 3->6 7 2c35e05-2c35e0e 3->7 4->2 8 2c35e1c-2c35e20 4->8 5->1 9 2c35e17-2c35e18 6->9 10 2c35e5f-2c360e7 RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress call 2c342c7 GetTickCount call 2c359f4 GetVersionExA call 2c43750 call 2c41fac * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2c43750 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c41fac * 4 QueryPerformanceCounter Sleep call 2c41fac * 2 call 2c43750 * 2 6->10 7->6 8->3 11 2c35e22-2c35e2d 8->11 9->4 56 2c360eb-2c360ed 10->56 57 2c360f6-2c360f8 56->57 58 2c360ef-2c360f4 56->58 60 2c36105-2c36422 RtlEnterCriticalSection RtlLeaveCriticalSection 57->60 61 2c360fa 57->61 59 2c360ff Sleep 58->59 59->60 63 2c36424-2c36427 60->63 64 2c3649a-2c364c4 RtlLeaveCriticalSection call 2c4133c 60->64 61->59 63->64 67 2c364c6-2c364d5 call 2c4133c 64->67 68 2c3650e-2c36526 call 2c4133c 64->68 67->68 75 2c364d7-2c364e6 call 2c4133c 67->75 73 2c367cd-2c367dc call 2c4133c 68->73 74 2c3652c-2c3652e 68->74 83 2c36821-2c36830 call 2c4133c 73->83 84 2c367de-2c367e0 73->84 74->73 78 2c36534-2c365df call 2c41fac RtlEnterCriticalSection RtlLeaveCriticalSection call 2c43750 * 5 call 2c3439c * 2 74->78 75->68 82 2c364e8-2c364f7 call 2c4133c 75->82 129 2c365e1-2c365e3 78->129 130 2c3661c 78->130 82->68 98 2c364f9-2c36508 call 2c4133c 82->98 96 2c36832-2c36840 call 2c35c0c call 2c35d1a 83->96 97 2c36845-2c36854 call 2c4133c 83->97 84->83 88 2c367e2-2c3681c call 2c43750 RtlEnterCriticalSection RtlLeaveCriticalSection 84->88 88->56 96->56 97->56 109 2c3685a-2c3685c 97->109 98->56 98->68 109->56 112 2c36862-2c3687b call 2c3439c 109->112 112->56 117 2c36881-2c36950 call 2c41418 call 2c31ba7 112->117 127 2c36952 call 2c3143f 117->127 128 2c36957-2c36978 RtlEnterCriticalSection 117->128 127->128 133 2c36984-2c369eb RtlLeaveCriticalSection call 2c33c67 call 2c33d7e call 2c37336 128->133 134 2c3697a-2c36981 128->134 129->130 135 2c365e5-2c365f7 call 2c4133c 129->135 131 2c36620-2c3664e call 2c41fac call 2c43750 call 2c3439c 130->131 155 2c36650-2c3665f call 2c425e6 131->155 156 2c3668f-2c36698 call 2c41f74 131->156 153 2c36b53-2c36b67 call 2c37fff 133->153 154 2c369f1-2c36a33 call 2c39721 133->154 134->133 135->130 142 2c365f9-2c3661a call 2c3439c 135->142 142->131 153->56 165 2c36a39-2c36a40 154->165 166 2c36b1d-2c36b4e call 2c373e5 call 2c333b2 154->166 155->156 169 2c36661 155->169 167 2c367bb-2c367c8 156->167 168 2c3669e-2c366b6 call 2c427b5 156->168 172 2c36a43-2c36a48 165->172 166->153 167->56 181 2c366c2 168->181 182 2c366b8-2c366c0 call 2c38733 168->182 170 2c36666-2c36678 call 2c41850 169->170 184 2c3667a 170->184 185 2c3667d-2c3668d call 2c425e6 170->185 172->172 176 2c36a4a-2c36a8f call 2c39721 172->176 176->166 190 2c36a95-2c36a9b 176->190 183 2c366c4-2c36768 call 2c3984b call 2c33863 call 2c35119 call 2c33863 call 2c39af1 call 2c39c0b 181->183 182->183 211 2c3676a call 2c3380b 183->211 212 2c3676f-2c3679a Sleep call 2c408f0 183->212 184->185 185->156 185->170 194 2c36a9e-2c36aa3 190->194 194->194 196 2c36aa5-2c36ae0 call 2c39721 194->196 196->166 202 2c36ae2-2c36b1c call 2c3c113 196->202 202->166 211->212 216 2c367a6-2c367b4 212->216 217 2c3679c-2c367a5 call 2c34100 212->217 216->167 219 2c367b6 call 2c3380b 216->219 217->216 219->167
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$gpt=%.8x&advizor=%d&box=%d&hp=%x&lp=%x&line=%d&os=%d.%d.%04d&flag=%d&itd=%d$ntdll.dll$sprintf$strcat
                                                                                              • API String ID: 0-1038016512
                                                                                              • Opcode ID: 92b1afba6e972cbc8159a7c5cffe95c32148568adafeff6f53e0e84fa11c14f3
                                                                                              • Instruction ID: cd2145070f6852cae552de121235a66890c2d6028d1bdd094e7bf07a81452aed
                                                                                              • Opcode Fuzzy Hash: 92b1afba6e972cbc8159a7c5cffe95c32148568adafeff6f53e0e84fa11c14f3
                                                                                              • Instruction Fuzzy Hash: A57116B1D483909FE320AF34A848B5B7BD8AFC5354F140E19F58897241DBB98855CFD6

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 434 2c3641c-2c36422 435 2c36424-2c36427 434->435 436 2c3649a-2c364c4 RtlLeaveCriticalSection call 2c4133c 434->436 435->436 439 2c364c6-2c364d5 call 2c4133c 436->439 440 2c3650e-2c36526 call 2c4133c 436->440 439->440 447 2c364d7-2c364e6 call 2c4133c 439->447 445 2c367cd-2c367dc call 2c4133c 440->445 446 2c3652c-2c3652e 440->446 455 2c36821-2c36830 call 2c4133c 445->455 456 2c367de-2c367e0 445->456 446->445 450 2c36534-2c365df call 2c41fac RtlEnterCriticalSection RtlLeaveCriticalSection call 2c43750 * 5 call 2c3439c * 2 446->450 447->440 454 2c364e8-2c364f7 call 2c4133c 447->454 507 2c365e1-2c365e3 450->507 508 2c3661c 450->508 454->440 470 2c364f9-2c36508 call 2c4133c 454->470 468 2c36832-2c36840 call 2c35c0c call 2c35d1a 455->468 469 2c36845-2c36854 call 2c4133c 455->469 456->455 460 2c367e2-2c3681c call 2c43750 RtlEnterCriticalSection RtlLeaveCriticalSection 456->460 471 2c360eb-2c360ed 460->471 468->471 469->471 485 2c3685a-2c3685c 469->485 470->440 470->471 477 2c360f6-2c360f8 471->477 478 2c360ef-2c360f4 471->478 486 2c36105-2c36134 RtlEnterCriticalSection RtlLeaveCriticalSection 477->486 487 2c360fa 477->487 483 2c360ff Sleep 478->483 483->486 485->471 490 2c36862-2c3687b call 2c3439c 485->490 486->434 487->483 490->471 495 2c36881-2c36950 call 2c41418 call 2c31ba7 490->495 505 2c36952 call 2c3143f 495->505 506 2c36957-2c36978 RtlEnterCriticalSection 495->506 505->506 511 2c36984-2c369eb RtlLeaveCriticalSection call 2c33c67 call 2c33d7e call 2c37336 506->511 512 2c3697a-2c36981 506->512 507->508 513 2c365e5-2c365f7 call 2c4133c 507->513 509 2c36620-2c3664e call 2c41fac call 2c43750 call 2c3439c 508->509 533 2c36650-2c3665f call 2c425e6 509->533 534 2c3668f-2c36698 call 2c41f74 509->534 531 2c36b53-2c36b67 call 2c37fff 511->531 532 2c369f1-2c36a33 call 2c39721 511->532 512->511 513->508 520 2c365f9-2c3661a call 2c3439c 513->520 520->509 531->471 543 2c36a39-2c36a40 532->543 544 2c36b1d-2c36b4e call 2c373e5 call 2c333b2 532->544 533->534 547 2c36661 533->547 545 2c367bb-2c367c8 534->545 546 2c3669e-2c366b6 call 2c427b5 534->546 550 2c36a43-2c36a48 543->550 544->531 545->471 559 2c366c2 546->559 560 2c366b8-2c366c0 call 2c38733 546->560 548 2c36666-2c36678 call 2c41850 547->548 562 2c3667a 548->562 563 2c3667d-2c3668d call 2c425e6 548->563 550->550 554 2c36a4a-2c36a8f call 2c39721 550->554 554->544 568 2c36a95-2c36a9b 554->568 561 2c366c4-2c36768 call 2c3984b call 2c33863 call 2c35119 call 2c33863 call 2c39af1 call 2c39c0b 559->561 560->561 589 2c3676a call 2c3380b 561->589 590 2c3676f-2c3679a Sleep call 2c408f0 561->590 562->563 563->534 563->548 572 2c36a9e-2c36aa3 568->572 572->572 574 2c36aa5-2c36ae0 call 2c39721 572->574 574->544 580 2c36ae2-2c36b1c call 2c3c113 574->580 580->544 589->590 594 2c367a6-2c367b4 590->594 595 2c3679c-2c367a5 call 2c34100 590->595 594->545 597 2c367b6 call 2c3380b 594->597 595->594 597->545
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: _memset$CriticalSection$Leave$Enter_malloc
                                                                                              • String ID: $%d;$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$auth_ip$auth_swith$block$connect$disconnect$idle$updips$updurls
                                                                                              • API String ID: 2008792657-3804430022
                                                                                              • Opcode ID: 4de5f5732d6e00f56443d2e5754d6ebcac373d89a267fa976fe5dd9ae1745f4f
                                                                                              • Instruction ID: de216e23ce190351d6b53eb7dd76e3265647860dfaceb04b52b22a8b318544e5
                                                                                              • Opcode Fuzzy Hash: 4de5f5732d6e00f56443d2e5754d6ebcac373d89a267fa976fe5dd9ae1745f4f
                                                                                              • Instruction Fuzzy Hash: 57022371608381AFE3369B20D845BAF7BE9AFC6318F240D1DE5C997281DB709544CB9B

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 600 2c3642e-2c36443 601 2c36445-2c3644b 600->601 602 2c3645f-2c36469 600->602 603 2c36451-2c3645e call 2c3534d 601->603 604 2c3644d-2c3644f 601->604 605 2c360eb-2c360ed 602->605 606 2c3646f-2c36493 call 2c43750 call 2c3439c 602->606 603->602 604->602 608 2c360f6-2c360f8 605->608 609 2c360ef-2c360f4 605->609 606->605 622 2c36499-2c364ba RtlEnterCriticalSection RtlLeaveCriticalSection 606->622 614 2c36105-2c36422 RtlEnterCriticalSection RtlLeaveCriticalSection 608->614 615 2c360fa 608->615 612 2c360ff Sleep 609->612 612->614 618 2c36424-2c36427 614->618 619 2c3649a-2c364bb RtlLeaveCriticalSection call 2c4133c 614->619 615->612 618->619 623 2c364c0-2c364c4 619->623 622->623 624 2c364bb call 2c4133c 622->624 625 2c364c6-2c364d5 call 2c4133c 623->625 626 2c3650e-2c36526 call 2c4133c 623->626 624->623 625->626 633 2c364d7-2c364e6 call 2c4133c 625->633 631 2c367cd-2c367dc call 2c4133c 626->631 632 2c3652c-2c3652e 626->632 641 2c36821-2c36830 call 2c4133c 631->641 642 2c367de-2c367e0 631->642 632->631 636 2c36534-2c365df call 2c41fac RtlEnterCriticalSection RtlLeaveCriticalSection call 2c43750 * 5 call 2c3439c * 2 632->636 633->626 640 2c364e8-2c364f7 call 2c4133c 633->640 687 2c365e1-2c365e3 636->687 688 2c3661c 636->688 640->626 656 2c364f9-2c36508 call 2c4133c 640->656 654 2c36832-2c36840 call 2c35c0c call 2c35d1a 641->654 655 2c36845-2c36854 call 2c4133c 641->655 642->641 646 2c367e2-2c3681c call 2c43750 RtlEnterCriticalSection RtlLeaveCriticalSection 642->646 646->605 654->605 655->605 667 2c3685a-2c3685c 655->667 656->605 656->626 667->605 670 2c36862-2c3687b call 2c3439c 667->670 670->605 675 2c36881-2c36950 call 2c41418 call 2c31ba7 670->675 685 2c36952 call 2c3143f 675->685 686 2c36957-2c36978 RtlEnterCriticalSection 675->686 685->686 691 2c36984-2c369eb RtlLeaveCriticalSection call 2c33c67 call 2c33d7e call 2c37336 686->691 692 2c3697a-2c36981 686->692 687->688 693 2c365e5-2c365f7 call 2c4133c 687->693 689 2c36620-2c3664e call 2c41fac call 2c43750 call 2c3439c 688->689 713 2c36650-2c3665f call 2c425e6 689->713 714 2c3668f-2c36698 call 2c41f74 689->714 711 2c36b53-2c36b67 call 2c37fff 691->711 712 2c369f1-2c36a33 call 2c39721 691->712 692->691 693->688 700 2c365f9-2c3661a call 2c3439c 693->700 700->689 711->605 723 2c36a39-2c36a40 712->723 724 2c36b1d-2c36b4e call 2c373e5 call 2c333b2 712->724 713->714 727 2c36661 713->727 725 2c367bb-2c367c8 714->725 726 2c3669e-2c366b6 call 2c427b5 714->726 730 2c36a43-2c36a48 723->730 724->711 725->605 739 2c366c2 726->739 740 2c366b8-2c366c0 call 2c38733 726->740 728 2c36666-2c36678 call 2c41850 727->728 742 2c3667a 728->742 743 2c3667d-2c3668d call 2c425e6 728->743 730->730 734 2c36a4a-2c36a8f call 2c39721 730->734 734->724 748 2c36a95-2c36a9b 734->748 741 2c366c4-2c36768 call 2c3984b call 2c33863 call 2c35119 call 2c33863 call 2c39af1 call 2c39c0b 739->741 740->741 769 2c3676a call 2c3380b 741->769 770 2c3676f-2c3679a Sleep call 2c408f0 741->770 742->743 743->714 743->728 752 2c36a9e-2c36aa3 748->752 752->752 754 2c36aa5-2c36ae0 call 2c39721 752->754 754->724 760 2c36ae2-2c36b1c call 2c3c113 754->760 760->724 769->770 774 2c367a6-2c367b4 770->774 775 2c3679c-2c367a5 call 2c34100 770->775 774->725 777 2c367b6 call 2c3380b 774->777 775->774 777->725
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: _memset$CriticalSection$EnterLeave_malloc_strtok$_free_swscanf
                                                                                              • String ID: <htm$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$auth_ip$auth_swith$block$connect$disconnect$idle$updips$updurls
                                                                                              • API String ID: 3441009308-1437582238
                                                                                              • Opcode ID: 84c469663383aeb0d5b1399e00213cd3bad92bfb6496e8e316e01e5e8f1cae94
                                                                                              • Instruction ID: 781e916baed70647679fc46d7a4cc1c82a13925468e8bb01c3276cb7f3d32960
                                                                                              • Opcode Fuzzy Hash: 84c469663383aeb0d5b1399e00213cd3bad92bfb6496e8e316e01e5e8f1cae94
                                                                                              • Instruction Fuzzy Hash: 35A17A316483406FE726AB349C01B6F7BEA9FC6718F240C2DF48997281DF71D940CA9A

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02C31D11
                                                                                              • GetLastError.KERNEL32 ref: 02C31D23
                                                                                                • Part of subcall function 02C31712: __EH_prolog.LIBCMT ref: 02C31717
                                                                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02C31D59
                                                                                              • GetLastError.KERNEL32 ref: 02C31D6B
                                                                                              • __beginthreadex.LIBCMT ref: 02C31DB1
                                                                                              • GetLastError.KERNEL32 ref: 02C31DC6
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 02C31DDD
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 02C31DEC
                                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 02C31E14
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 02C31E1B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CloseErrorHandleLast$CreateEvent$H_prologObjectSingleWait__beginthreadex
                                                                                              • String ID: thread$thread.entry_event$thread.exit_event
                                                                                              • API String ID: 831262434-3017686385
                                                                                              • Opcode ID: 1eb56f93233ff2d368c49c4518928397ef45fcb1d8ccb86fb843099b054c286f
                                                                                              • Instruction ID: a150fc0899a2f7f6073c66e99c59914cdd5e463a0c4907d8e4298638bb4d496e
                                                                                              • Opcode Fuzzy Hash: 1eb56f93233ff2d368c49c4518928397ef45fcb1d8ccb86fb843099b054c286f
                                                                                              • Instruction Fuzzy Hash: 5F316A71A003119FD701EF20C848B6BBBA5EF84794F144E2DF8599B291DB70D9898FD2

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 02C34D8B
                                                                                              • RtlEnterCriticalSection.NTDLL(02C64FD0), ref: 02C34DB7
                                                                                              • RtlLeaveCriticalSection.NTDLL(02C64FD0), ref: 02C34DC3
                                                                                                • Part of subcall function 02C34BED: __EH_prolog.LIBCMT ref: 02C34BF2
                                                                                                • Part of subcall function 02C34BED: InterlockedExchange.KERNEL32(?,00000000), ref: 02C34CF2
                                                                                              • RtlEnterCriticalSection.NTDLL(02C64FD0), ref: 02C34E93
                                                                                              • RtlLeaveCriticalSection.NTDLL(02C64FD0), ref: 02C34E99
                                                                                              • RtlEnterCriticalSection.NTDLL(02C64FD0), ref: 02C34EA0
                                                                                              • RtlLeaveCriticalSection.NTDLL(02C64FD0), ref: 02C34EA6
                                                                                              • RtlEnterCriticalSection.NTDLL(02C64FD0), ref: 02C350A7
                                                                                              • RtlLeaveCriticalSection.NTDLL(02C64FD0), ref: 02C350AD
                                                                                              • RtlEnterCriticalSection.NTDLL(02C64FD0), ref: 02C350B8
                                                                                              • RtlLeaveCriticalSection.NTDLL(02C64FD0), ref: 02C350C1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CriticalSection$EnterLeave$H_prolog$ExchangeInterlocked
                                                                                              • String ID:
                                                                                              • API String ID: 2062355503-0
                                                                                              • Opcode ID: f5c05237ba8ada15d8c16a61596e292719e6802b00725e29d0aae236d2df2953
                                                                                              • Instruction ID: 2b52dc864d9d92a96b7cd0ae8ff1fe4c137bd31a533409734f8f206d91927e9d
                                                                                              • Opcode Fuzzy Hash: f5c05237ba8ada15d8c16a61596e292719e6802b00725e29d0aae236d2df2953
                                                                                              • Instruction Fuzzy Hash: 46B18D71D0025DDFEF26DFA0D884BEEBBB5AF08318F10445AE41576280DBB55A89CF92

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 881 401301-40135e FindResourceA 882 401360-401362 881->882 883 401367-40137d SizeofResource 881->883 884 401538-40153c 882->884 885 401386-4013fe LoadResource LockResource GlobalAlloc call 402490 * 2 883->885 886 40137f-401381 883->886 891 401407-40140b 885->891 886->884 892 40140d-40141d 891->892 893 40141f-401428 GetTickCount 891->893 892->891 895 401491-401499 893->895 896 40142a-40142e 893->896 897 4014a2-4014a8 895->897 898 401430-401438 896->898 899 40148f 896->899 900 4014f0-401525 GlobalAlloc call 401000 897->900 901 4014aa-4014e8 897->901 902 401441-401447 898->902 899->900 909 40152a-401535 900->909 903 4014ea 901->903 904 4014ee 901->904 906 401449-401485 902->906 907 40148d 902->907 903->904 904->897 910 401487 906->910 911 40148b 906->911 907->896 909->884 910->911 911->902
                                                                                              APIs
                                                                                              • FindResourceA.KERNEL32(?,0000000A), ref: 00401351
                                                                                              • SizeofResource.KERNEL32(00000000), ref: 00401370
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: Resource$FindSizeof
                                                                                              • String ID:
                                                                                              • API String ID: 3019604839-3916222277
                                                                                              • Opcode ID: d05602b0e20a881077e161112d5bd34232c8f71c7560e683aad862cf59917e15
                                                                                              • Instruction ID: 779852d327d389dbbb2f1b261a2bb7141e3a4eae573781fe7d13a424a4f3f89b
                                                                                              • Opcode Fuzzy Hash: d05602b0e20a881077e161112d5bd34232c8f71c7560e683aad862cf59917e15
                                                                                              • Instruction Fuzzy Hash: F1811075D04258DFDF01CFE8D985AEEBBB0BF09305F1400AAE581B7262C3385A84DB69

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • RtlEnterCriticalSection.NTDLL(?), ref: 02C32706
                                                                                              • CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02C3272B
                                                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02C53163), ref: 02C32738
                                                                                                • Part of subcall function 02C31712: __EH_prolog.LIBCMT ref: 02C31717
                                                                                              • SetWaitableTimer.KERNEL32(?,?,000493E0,00000000,00000000,00000000), ref: 02C32778
                                                                                              • RtlLeaveCriticalSection.NTDLL(?), ref: 02C327D9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                                              • String ID: timer
                                                                                              • API String ID: 4293676635-1792073242
                                                                                              • Opcode ID: 12de0365f58ca9b9d688ec6669ffd7ee451c8327beee0397e9879799d7822591
                                                                                              • Instruction ID: aaec5c65248fec26bb5e57f72dbff4dc57c9d9eb05282859160308f041611a69
                                                                                              • Opcode Fuzzy Hash: 12de0365f58ca9b9d688ec6669ffd7ee451c8327beee0397e9879799d7822591
                                                                                              • Instruction Fuzzy Hash: E131BAB1904711AFD3119F65C884B26BBE8FB89764F000A2EF81583A80DB70E950CFD2

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 964 2c32b95-2c32baf 965 2c32bb1-2c32bb9 call 2c3fb10 964->965 966 2c32bc7-2c32bcb 964->966 973 2c32bbf-2c32bc2 965->973 968 2c32bdf 966->968 969 2c32bcd-2c32bd0 966->969 972 2c32be2-2c32c11 WSASetLastError WSARecv call 2c39505 968->972 969->968 971 2c32bd2-2c32bdd call 2c3fb10 969->971 971->973 978 2c32c16-2c32c1d 972->978 976 2c32d30 973->976 981 2c32d32-2c32d38 976->981 979 2c32c1f-2c32c2a call 2c3fb10 978->979 980 2c32c2c-2c32c32 978->980 989 2c32c3f-2c32c42 979->989 983 2c32c46-2c32c48 980->983 984 2c32c34-2c32c39 call 2c3fb10 980->984 987 2c32c4a-2c32c4d 983->987 988 2c32c4f-2c32c60 call 2c3fb10 983->988 984->989 991 2c32c66-2c32c69 987->991 988->981 988->991 989->983 994 2c32c73-2c32c76 991->994 995 2c32c6b-2c32c6d 991->995 994->976 996 2c32c7c-2c32c9a call 2c3fb10 call 2c3166f 994->996 995->994 997 2c32d22-2c32d2d call 2c31996 995->997 1004 2c32cbc-2c32cfa WSASetLastError select call 2c39505 996->1004 1005 2c32c9c-2c32cba call 2c3fb10 call 2c3166f 996->1005 997->976 1011 2c32d08 1004->1011 1012 2c32cfc-2c32d06 call 2c3fb10 1004->1012 1005->976 1005->1004 1013 2c32d15-2c32d17 1011->1013 1014 2c32d0a-2c32d12 call 2c3fb10 1011->1014 1018 2c32d19-2c32d1d 1012->1018 1013->976 1013->1018 1014->1013 1018->972
                                                                                              APIs
                                                                                              • WSASetLastError.WS2_32(00000000), ref: 02C32BE4
                                                                                              • WSARecv.WS2_32(?,?,?,?,?,00000000,00000000), ref: 02C32C07
                                                                                                • Part of subcall function 02C39505: WSAGetLastError.WS2_32(00000000,?,?,02C32A51), ref: 02C39513
                                                                                              • WSASetLastError.WS2_32 ref: 02C32CD3
                                                                                              • select.WS2_32(?,?,00000000,00000000,00000000), ref: 02C32CE7
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$Recvselect
                                                                                              • String ID: 3'
                                                                                              • API String ID: 886190287-280543908
                                                                                              • Opcode ID: 8dc8b2a3eb35967e3345e62548d8f8d04aac1285aaa2ec539547a310b1d41713
                                                                                              • Instruction ID: 7e7a074fedeeab4c25eb51099bf38ae097d9b1a627dbc51c364a975f18e0ae9c
                                                                                              • Opcode Fuzzy Hash: 8dc8b2a3eb35967e3345e62548d8f8d04aac1285aaa2ec539547a310b1d41713
                                                                                              • Instruction Fuzzy Hash: 8A416EB1A043019FDB12DF75D9147ABBBE9AF84398F104D1EE899C7290EB74D940CB92

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1047 2c31ba7-2c31bcf call 2c52a00 RtlEnterCriticalSection 1050 2c31bd1 1047->1050 1051 2c31be9-2c31bf7 RtlLeaveCriticalSection call 2c3d32f 1047->1051 1052 2c31bd4-2c31be0 call 2c31b79 1050->1052 1053 2c31bfa-2c31c20 RtlEnterCriticalSection 1051->1053 1057 2c31be2-2c31be7 1052->1057 1058 2c31c55-2c31c6e RtlLeaveCriticalSection 1052->1058 1055 2c31c34-2c31c36 1053->1055 1059 2c31c22-2c31c2f call 2c31b79 1055->1059 1060 2c31c38-2c31c43 1055->1060 1057->1051 1057->1052 1062 2c31c45-2c31c4b 1059->1062 1065 2c31c31 1059->1065 1060->1062 1062->1058 1064 2c31c4d-2c31c51 1062->1064 1064->1058 1065->1055
                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 02C31BAC
                                                                                              • RtlEnterCriticalSection.NTDLL ref: 02C31BBC
                                                                                              • RtlLeaveCriticalSection.NTDLL ref: 02C31BEA
                                                                                              • RtlEnterCriticalSection.NTDLL ref: 02C31C13
                                                                                              • RtlLeaveCriticalSection.NTDLL ref: 02C31C56
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CriticalSection$EnterLeave$H_prolog
                                                                                              • String ID:
                                                                                              • API String ID: 1633115879-0
                                                                                              • Opcode ID: a656c7ec25833910bb70458670d7e18721db19d7551f6b9f08b4fff279adcde7
                                                                                              • Instruction ID: 23a789c423117bc3701fe5cb2f4041e23bf2cc86e3d2524da0a0f073ba175c47
                                                                                              • Opcode Fuzzy Hash: a656c7ec25833910bb70458670d7e18721db19d7551f6b9f08b4fff279adcde7
                                                                                              • Instruction Fuzzy Hash: 1421CAB1A006149FCB11CF68D44479ABBB5FF88314F148949EC09A7301DBB1EA45CBE0

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • GetVersion.KERNEL32 ref: 00402A46
                                                                                                • Part of subcall function 00403B64: HeapCreate.KERNEL32(00000000,00001000,00000000,00402A7F,00000000), ref: 00403B75
                                                                                                • Part of subcall function 00403B64: HeapDestroy.KERNEL32 ref: 00403BB4
                                                                                              • GetCommandLineA.KERNEL32 ref: 00402A94
                                                                                              • GetStartupInfoA.KERNEL32(?), ref: 00402ABF
                                                                                              • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00402AE2
                                                                                                • Part of subcall function 00402B3B: ExitProcess.KERNEL32 ref: 00402B58
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                                                              • String ID:
                                                                                              • API String ID: 2057626494-0
                                                                                              • Opcode ID: 81c04d43b3f46c58329c6832fe0805ef85b64df99fa32ea28edf2ad19d5a1781
                                                                                              • Instruction ID: 5f87248e4510ca7a7a053da507506fe2897125482441b09741c869e2758f94b2
                                                                                              • Opcode Fuzzy Hash: 81c04d43b3f46c58329c6832fe0805ef85b64df99fa32ea28edf2ad19d5a1781
                                                                                              • Instruction Fuzzy Hash: BA214CB19006159ADB04AFA6DE49A6E7FA8EB04715F10413FF905BB2D1DB384900CA6C

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1095 2c32edd-2c32f1f WSASetLastError WSASocketA call 2c3fb10 WSAGetLastError 1098 2c32f21-2c32f25 1095->1098 1099 2c32f49-2c32f4f 1095->1099 1100 2c32f27-2c32f36 setsockopt 1098->1100 1101 2c32f3c-2c32f47 call 2c3fb10 1098->1101 1100->1101 1101->1099
                                                                                              APIs
                                                                                              • WSASetLastError.WS2_32(00000000), ref: 02C32EEE
                                                                                              • WSASocketA.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02C32EFD
                                                                                              • WSAGetLastError.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02C32F0C
                                                                                              • setsockopt.WS2_32(00000000,00000029,0000001B,00000000,00000004), ref: 02C32F36
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$Socketsetsockopt
                                                                                              • String ID:
                                                                                              • API String ID: 2093263913-0
                                                                                              • Opcode ID: 08a8baf094b2281e9a64e8670549d877e061e477a006c56237eb119437160e09
                                                                                              • Instruction ID: 9b99761623ab6dcfdf9f138f13ea1d355c228aa71c5174a51c71d808dad90bc5
                                                                                              • Opcode Fuzzy Hash: 08a8baf094b2281e9a64e8670549d877e061e477a006c56237eb119437160e09
                                                                                              • Instruction Fuzzy Hash: CE017571A00314BBDB205F66DC48B9B7BA9DF897A5F008969F918DB151D77189008BA0

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1104 2c32db5-2c32dc8 1105 2c32de4-2c32de8 1104->1105 1106 2c32dca-2c32dd2 call 2c3fb10 1104->1106 1108 2c32dea-2c32ded 1105->1108 1109 2c32dfc-2c32e07 call 2c32d39 1105->1109 1115 2c32dd8 1106->1115 1108->1109 1112 2c32def-2c32dfa call 2c3fb10 1108->1112 1114 2c32e0c-2c32e11 1109->1114 1112->1115 1117 2c32e13 1114->1117 1118 2c32ddd-2c32de3 1114->1118 1119 2c32ddb 1115->1119 1120 2c32e16-2c32e18 1117->1120 1119->1118 1120->1119 1121 2c32e1a-2c32e35 call 2c3fb10 call 2c3166f 1120->1121 1126 2c32e37-2c32e52 call 2c3fb10 call 2c3166f 1121->1126 1127 2c32e54-2c32e97 WSASetLastError select call 2c39505 1121->1127 1126->1119 1126->1127 1132 2c32ea6 1127->1132 1133 2c32e99-2c32ea4 call 2c3fb10 1127->1133 1137 2c32eb6-2c32eb8 1132->1137 1138 2c32ea8-2c32eb3 call 2c3fb10 1132->1138 1141 2c32ebe-2c32ed2 call 2c32d39 1133->1141 1137->1119 1137->1141 1138->1137 1141->1120 1145 2c32ed8 1141->1145 1145->1118
                                                                                              APIs
                                                                                                • Part of subcall function 02C32D39: WSASetLastError.WS2_32(00000000), ref: 02C32D47
                                                                                                • Part of subcall function 02C32D39: WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02C32D5C
                                                                                              • WSASetLastError.WS2_32(00000000), ref: 02C32E6D
                                                                                              • select.WS2_32(?,00000000,00000001,00000000,00000000), ref: 02C32E83
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$Sendselect
                                                                                              • String ID: 3'
                                                                                              • API String ID: 2958345159-280543908
                                                                                              • Opcode ID: 56d60a154221f412690a12a949f3bfa466234116177b55ada215cac3b9a8197e
                                                                                              • Instruction ID: 83daca03c315a5302608249eb95b3c3cd2bb3366cab9994a6fd2f527b80f27cb
                                                                                              • Opcode Fuzzy Hash: 56d60a154221f412690a12a949f3bfa466234116177b55ada215cac3b9a8197e
                                                                                              • Instruction Fuzzy Hash: 28319CB1E002059FDF129FA1D8157EEBBEAAF44358F004D5ADC0997280E7B19991DBA1
                                                                                              APIs
                                                                                              • WSASetLastError.WS2_32(00000000), ref: 02C32AEA
                                                                                              • connect.WS2_32(?,?,?), ref: 02C32AF5
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ErrorLastconnect
                                                                                              • String ID: 3'
                                                                                              • API String ID: 374722065-280543908
                                                                                              • Opcode ID: 4f6a44f18323f8e47cb204dfd9d499ab1cd00f8f251f3819f254d9ccae015069
                                                                                              • Instruction ID: 5239eb4c893e872ecef0b09af930fb3252285f5c92b1be149c8fdb7284e0655d
                                                                                              • Opcode Fuzzy Hash: 4f6a44f18323f8e47cb204dfd9d499ab1cd00f8f251f3819f254d9ccae015069
                                                                                              • Instruction Fuzzy Hash: DE21A471E00204ABCF11AFB5D4146EEBBBAEF84368F108D99DC19A3280DB745A019FE1
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: H_prolog
                                                                                              • String ID:
                                                                                              • API String ID: 3519838083-0
                                                                                              • Opcode ID: af9e9ab3b14e79c8f595867f9ac74df3edf0a29145aa3414be9dfe0a5591e59b
                                                                                              • Instruction ID: a31ab86d2a110c6824cf2a9d5e80d48e1661a0ab8624e0826d62ba28f68aa5d9
                                                                                              • Opcode Fuzzy Hash: af9e9ab3b14e79c8f595867f9ac74df3edf0a29145aa3414be9dfe0a5591e59b
                                                                                              • Instruction Fuzzy Hash: 4A513BB1904256DFCB06DF68D4506AABBB1FF48320F14899EE8299B390D774DA50CFE1
                                                                                              APIs
                                                                                              • InterlockedIncrement.KERNEL32(?), ref: 02C336A7
                                                                                                • Part of subcall function 02C32420: InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02C32432
                                                                                                • Part of subcall function 02C32420: PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02C32445
                                                                                                • Part of subcall function 02C32420: RtlEnterCriticalSection.NTDLL(?), ref: 02C32454
                                                                                                • Part of subcall function 02C32420: InterlockedExchange.KERNEL32(?,00000001), ref: 02C32469
                                                                                                • Part of subcall function 02C32420: RtlLeaveCriticalSection.NTDLL(?), ref: 02C32470
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Interlocked$CriticalExchangeSection$CompareCompletionEnterIncrementLeavePostQueuedStatus
                                                                                              • String ID:
                                                                                              • API String ID: 1601054111-0
                                                                                              • Opcode ID: cdaec8e9d44fb3ca59aab4d4cb29a83744d0ebbcbec04de699f1ba5904dfcbef
                                                                                              • Instruction ID: ce30394a8f8c138c707cc115b83280bebcc7ea91680a805c3c3ca4b01814e60a
                                                                                              • Opcode Fuzzy Hash: cdaec8e9d44fb3ca59aab4d4cb29a83744d0ebbcbec04de699f1ba5904dfcbef
                                                                                              • Instruction Fuzzy Hash: DC11E3B5100248ABDF229F14CD85FAA3BA9EF85364F104956FE52DB290CB74D960CBD4
                                                                                              APIs
                                                                                              • __beginthreadex.LIBCMT ref: 02C41106
                                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,00000002,02C39985,00000000), ref: 02C41137
                                                                                              • ResumeThread.KERNEL32(?,?,?,?,?,00000002,02C39985,00000000), ref: 02C41145
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CloseHandleResumeThread__beginthreadex
                                                                                              • String ID:
                                                                                              • API String ID: 1685284544-0
                                                                                              • Opcode ID: e18c22b6b5abc310479d68b8c0f158695e263d60d3b63a7510b6280e7a5ff02d
                                                                                              • Instruction ID: bd5d0bee8ac84fa6187fa3d19fcc86a5dc6954a4020f30e86d0616713202b045
                                                                                              • Opcode Fuzzy Hash: e18c22b6b5abc310479d68b8c0f158695e263d60d3b63a7510b6280e7a5ff02d
                                                                                              • Instruction Fuzzy Hash: 8DF068712402149BE7209F58DC81F96B3E8AF88725F18056AF598D7281D7B1E8D29AD0
                                                                                              APIs
                                                                                              • lstrcmpiW.KERNEL32(?,/chk), ref: 00402076
                                                                                              Strings
                                                                                              • /chk, xrefs: 0040184C
                                                                                              • C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe, xrefs: 00402084
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: lstrcmpi
                                                                                              • String ID: /chk$C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                              • API String ID: 1586166983-2973135517
                                                                                              • Opcode ID: 1fcc37e09c1ea7230a498a40b0b973437d02a2f2e9a4db9a0274fead2a7f7eda
                                                                                              • Instruction ID: 74cbafdec92468c71f0876e0db1c96b0349c7e5a88034ab4a6aa4353a5a9151b
                                                                                              • Opcode Fuzzy Hash: 1fcc37e09c1ea7230a498a40b0b973437d02a2f2e9a4db9a0274fead2a7f7eda
                                                                                              • Instruction Fuzzy Hash: 48E01230E44115DFDB159B64DE49F997BB09B04700F2580F7E0057A1E1C3789E05AB4D
                                                                                              APIs
                                                                                              • InterlockedIncrement.KERNEL32(02C6529C), ref: 02C31ABA
                                                                                              • WSAStartup.WS2_32(00000002,00000000), ref: 02C31ACB
                                                                                              • InterlockedExchange.KERNEL32(02C652A0,00000000), ref: 02C31AD7
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Interlocked$ExchangeIncrementStartup
                                                                                              • String ID:
                                                                                              • API String ID: 1856147945-0
                                                                                              • Opcode ID: f381fa18bad6bc1d2734115b0153bbcd4b8540e23ade34735f26f73b3bb39395
                                                                                              • Instruction ID: 5729ff0ee1892d108ca103c1449dcda0dae53690486d803d3838a799366eb60f
                                                                                              • Opcode Fuzzy Hash: f381fa18bad6bc1d2734115b0153bbcd4b8540e23ade34735f26f73b3bb39395
                                                                                              • Instruction Fuzzy Hash: 9BD02E31C803145FE22066A0AD4EB383B6CDB05752FD00B20FD29E00C0EA91A52081E2
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: LibraryLoad
                                                                                              • String ID: KTSw
                                                                                              • API String ID: 1029625771-1494445124
                                                                                              • Opcode ID: 4f2a044669ee3a7f8e557a0fe295be6ccb4efb4d025627d9b6c5b8f632b8761b
                                                                                              • Instruction ID: fd2a1524803d9f791a19ed99706cee7d5fcfa8ce046a4721f3f2475378a41bb1
                                                                                              • Opcode Fuzzy Hash: 4f2a044669ee3a7f8e557a0fe295be6ccb4efb4d025627d9b6c5b8f632b8761b
                                                                                              • Instruction Fuzzy Hash: BE01D274E00218CFDB08CFA8D8A1AEDB7B1BB45751F11816AE812773E0D778A846DB24
                                                                                              APIs
                                                                                              • OpenSCManagerA.ADVAPI32(?,?,00000002), ref: 004021E1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: ManagerOpen
                                                                                              • String ID: \
                                                                                              • API String ID: 1889721586-2967466578
                                                                                              • Opcode ID: ab7262ef1a1c113267c03554b46be56ee1e56a79f353c420679976447f28f039
                                                                                              • Instruction ID: 3ec9549b6e352ce66e0eb209fd540e70c3ae76cd918bd22cefb49a509ae65df1
                                                                                              • Opcode Fuzzy Hash: ab7262ef1a1c113267c03554b46be56ee1e56a79f353c420679976447f28f039
                                                                                              • Instruction Fuzzy Hash: D4F08970C0D149FEC7504AA44E5D9FA39A86B11304F3044F79647B25D1D67C4B4AF62F
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: Close
                                                                                              • String ID: DivXConverter
                                                                                              • API String ID: 3535843008-4132716239
                                                                                              • Opcode ID: 7593801eb0e49be82e6296bd0d89e7dcf05c3c83ad0ca638d9093b74245f9016
                                                                                              • Instruction ID: 67e54684091948d0756a1cf5eba992663c3e21a0aee559e87b623a49b932659a
                                                                                              • Opcode Fuzzy Hash: 7593801eb0e49be82e6296bd0d89e7dcf05c3c83ad0ca638d9093b74245f9016
                                                                                              • Instruction Fuzzy Hash: 69D0C964D8C510E6E60616D00A04C7A65295945314B31403B6287310E186BD540B77AF
                                                                                              APIs
                                                                                              • RegSetValueExA.KERNEL32(?,divx_converter_i57,00000000,00000004), ref: 0040D98D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: Value
                                                                                              • String ID: divx_converter_i57
                                                                                              • API String ID: 3702945584-1224064743
                                                                                              • Opcode ID: dccdff77034fc0fbb9248a0d4d0d045b576598a7dc9cb3f9f0fb3bc41c3515a3
                                                                                              • Instruction ID: 6731fff5fac9b1ffde77a5bf75cea8f45c13f049f22940bb46bbefbecb9c92f2
                                                                                              • Opcode Fuzzy Hash: dccdff77034fc0fbb9248a0d4d0d045b576598a7dc9cb3f9f0fb3bc41c3515a3
                                                                                              • Instruction Fuzzy Hash: B4C04C74E88114EBDB250EC08E06B9875716B18B09F2104F6B346340D086790A69BE0E
                                                                                              APIs
                                                                                              • RegOpenKeyExA.KERNEL32(80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders), ref: 0040D82F
                                                                                              Strings
                                                                                              • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 004016C2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: Open
                                                                                              • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                              • API String ID: 71445658-2036018995
                                                                                              • Opcode ID: 90e5c35e8936f4e0780e75e1111e9e3f72fb78051c72de30693e0a303eb4fe4d
                                                                                              • Instruction ID: d14074a5c2d983e6dc2ef66f9858a22cd0290d27c0072652025633c19380aabf
                                                                                              • Opcode Fuzzy Hash: 90e5c35e8936f4e0780e75e1111e9e3f72fb78051c72de30693e0a303eb4fe4d
                                                                                              • Instruction Fuzzy Hash: 33B01230604100D5E1041FA10D09B321124BB04701F30403F1503B00C1D93C4019D43F
                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 02C34BF2
                                                                                                • Part of subcall function 02C31BA7: __EH_prolog.LIBCMT ref: 02C31BAC
                                                                                                • Part of subcall function 02C31BA7: RtlEnterCriticalSection.NTDLL ref: 02C31BBC
                                                                                                • Part of subcall function 02C31BA7: RtlLeaveCriticalSection.NTDLL ref: 02C31BEA
                                                                                                • Part of subcall function 02C31BA7: RtlEnterCriticalSection.NTDLL ref: 02C31C13
                                                                                                • Part of subcall function 02C31BA7: RtlLeaveCriticalSection.NTDLL ref: 02C31C56
                                                                                                • Part of subcall function 02C3D0F7: __EH_prolog.LIBCMT ref: 02C3D0FC
                                                                                                • Part of subcall function 02C3D0F7: InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C3D17B
                                                                                              • InterlockedExchange.KERNEL32(?,00000000), ref: 02C34CF2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CriticalSection$H_prolog$EnterExchangeInterlockedLeave
                                                                                              • String ID:
                                                                                              • API String ID: 1927618982-0
                                                                                              • Opcode ID: b11ea586bc098b0b2c4f778fec9878710b3591d7a8ecce5628e6e04bd0d6db30
                                                                                              • Instruction ID: 4931b10afeac3ca8290b2e2c3b7d6bf496eddb416bcb9aff7c74a9eb454c497a
                                                                                              • Opcode Fuzzy Hash: b11ea586bc098b0b2c4f778fec9878710b3591d7a8ecce5628e6e04bd0d6db30
                                                                                              • Instruction Fuzzy Hash: D65138B1D04248DFDB16DFA8C484AEEFBB5EF48314F14859AE805AB351DB309A44CF91
                                                                                              APIs
                                                                                              • WSASetLastError.WS2_32(00000000), ref: 02C32D47
                                                                                              • WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02C32D5C
                                                                                                • Part of subcall function 02C39505: WSAGetLastError.WS2_32(00000000,?,?,02C32A51), ref: 02C39513
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$Send
                                                                                              • String ID:
                                                                                              • API String ID: 1282938840-0
                                                                                              • Opcode ID: 8ab011f85c1cf52713d2e8c86da69900b4044e5e719fa310485cf93c394486ff
                                                                                              • Instruction ID: 730292c4c80b39b941c1269cae35235c75892649da4d8d690c220b00b1da839d
                                                                                              • Opcode Fuzzy Hash: 8ab011f85c1cf52713d2e8c86da69900b4044e5e719fa310485cf93c394486ff
                                                                                              • Instruction Fuzzy Hash: 9B01A7B5900205EFDB215F95D8449ABBBFDFF857A47200D2EEC5993200DB709D40DBA2
                                                                                              APIs
                                                                                              • WSASetLastError.WS2_32(00000000), ref: 02C37402
                                                                                              • shutdown.WS2_32(?,00000002), ref: 02C3740B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ErrorLastshutdown
                                                                                              • String ID:
                                                                                              • API String ID: 1920494066-0
                                                                                              • Opcode ID: 35dc95cf9e3a277a21fb4276175d35baf31587b003e1374586eb685c1eaaac60
                                                                                              • Instruction ID: 5269f868a8908d87d28c88128fb09ca1f0b225e43769ae69225a1c2cc6363426
                                                                                              • Opcode Fuzzy Hash: 35dc95cf9e3a277a21fb4276175d35baf31587b003e1374586eb685c1eaaac60
                                                                                              • Instruction Fuzzy Hash: 93F09AB2E043148FC711AF28D814B9ABBE5AF49375F018D1DE999A7380D731A810CFA1
                                                                                              APIs
                                                                                              • HeapCreate.KERNEL32(00000000,00001000,00000000,00402A7F,00000000), ref: 00403B75
                                                                                                • Part of subcall function 00403A1C: GetVersionExA.KERNEL32 ref: 00403A3B
                                                                                              • HeapDestroy.KERNEL32 ref: 00403BB4
                                                                                                • Part of subcall function 00403F3B: HeapAlloc.KERNEL32(00000000,00000140,00403B9D,000003F8), ref: 00403F48
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: Heap$AllocCreateDestroyVersion
                                                                                              • String ID:
                                                                                              • API String ID: 2507506473-0
                                                                                              • Opcode ID: 41655e9e9c0e703031797a4b7b8f832f06af8b7de0b6b38e25141203e3b9edaa
                                                                                              • Instruction ID: 13181fdbc77bd6b5762d4953551df96dffaf81345f3f43d3ea23e6f05a00c699
                                                                                              • Opcode Fuzzy Hash: 41655e9e9c0e703031797a4b7b8f832f06af8b7de0b6b38e25141203e3b9edaa
                                                                                              • Instruction Fuzzy Hash: 58F065706547029ADB101F319E4572A3EA89B4075BF10447FFD00F51D1EFBC9784951D
                                                                                              APIs
                                                                                              • CopyFileA.KERNEL32 ref: 00401ED1
                                                                                              • OpenSCManagerA.ADVAPI32(?,?,00000002), ref: 004021E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: CopyFileManagerOpen
                                                                                              • String ID:
                                                                                              • API String ID: 3059512871-0
                                                                                              • Opcode ID: af7edecfb0c053e48cf1d62ac29af4eb1afbd6a02cdde2f90348ecd5fed2f5fe
                                                                                              • Instruction ID: 1c0398504374640a6dcf7a38702939c3dafa6dd44a2b962941fbdaa50a26c04a
                                                                                              • Opcode Fuzzy Hash: af7edecfb0c053e48cf1d62ac29af4eb1afbd6a02cdde2f90348ecd5fed2f5fe
                                                                                              • Instruction Fuzzy Hash: 1AD0C9A0548002FECA901B905EECD6A79DC5700308B61803AB34AB00D0C97C454EE52E
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32 ref: 0040D32D
                                                                                              • GetModuleFileNameA.KERNEL32(00000000), ref: 0040DD48
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: Module$FileHandleName
                                                                                              • String ID:
                                                                                              • API String ID: 4146042529-0
                                                                                              • Opcode ID: f5c27717e5ef41f0f857a2eae5bc6c8ab2a0105bdb2503ae6146b1f7b7bcd180
                                                                                              • Instruction ID: ccbbb6475ca3d18445271a062cd20f9213edf34b9905a092daa81f5f647a0110
                                                                                              • Opcode Fuzzy Hash: f5c27717e5ef41f0f857a2eae5bc6c8ab2a0105bdb2503ae6146b1f7b7bcd180
                                                                                              • Instruction Fuzzy Hash: 32C01279C01209EFC7009FE48A0848836B8AE4C2413228476A28AF2690CA34021AAB3A
                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 02C3511E
                                                                                                • Part of subcall function 02C33D7E: htons.WS2_32(?), ref: 02C33DA2
                                                                                                • Part of subcall function 02C33D7E: htonl.WS2_32(00000000), ref: 02C33DB9
                                                                                                • Part of subcall function 02C33D7E: htonl.WS2_32(00000000), ref: 02C33DC0
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: htonl$H_prologhtons
                                                                                              • String ID:
                                                                                              • API String ID: 4039807196-0
                                                                                              • Opcode ID: 86b6104ebc28b5ee5b20caaf6a7209c7ba14371a36a982fad8ecb5a070051b0d
                                                                                              • Instruction ID: 40a4e0073adbea21705896906e773e4debea8fd1343368e4f0520a1873ffaf00
                                                                                              • Opcode Fuzzy Hash: 86b6104ebc28b5ee5b20caaf6a7209c7ba14371a36a982fad8ecb5a070051b0d
                                                                                              • Instruction Fuzzy Hash: ED814AB1D0424ECECF06DFA8D080AEEBBB5EF48314F20855AD854B7240EB759A45CFA5
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C68000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C68000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c68000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileWrite
                                                                                              • String ID:
                                                                                              • API String ID: 3934441357-0
                                                                                              • Opcode ID: f0f992c9a14648116e54e1e55e226153862c82844c9f6200535aedad599e6f18
                                                                                              • Instruction ID: 667083bb958fe54ba5e7f8cf794cd7063a535a84fbffeb4f7c8bbf9932599eec
                                                                                              • Opcode Fuzzy Hash: f0f992c9a14648116e54e1e55e226153862c82844c9f6200535aedad599e6f18
                                                                                              • Instruction Fuzzy Hash: 4C51E5F250C604AFE705AF19DCC177AB7E9EF94320F16892DE7C587700EA3558448A9B
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C68000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C68000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c68000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileWrite
                                                                                              • String ID:
                                                                                              • API String ID: 3934441357-0
                                                                                              • Opcode ID: a1b657f9c624e80a7d425986298567faa392f385b367cc798c6221010b80afac
                                                                                              • Instruction ID: 1bdeb0f7213e18bc0b6ee7fe45fad26e93a7a47256d7bdcf3819a2eab10a4f42
                                                                                              • Opcode Fuzzy Hash: a1b657f9c624e80a7d425986298567faa392f385b367cc798c6221010b80afac
                                                                                              • Instruction Fuzzy Hash: 6F416AB260C6009FE305BE19EC867BABBE5EF84720F06492DE7C583640DA35A440CAC7
                                                                                              APIs
                                                                                              • DeleteFileA.KERNEL32(?,254FBF0C), ref: 02C9CB59
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C68000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C68000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c68000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: DeleteFile
                                                                                              • String ID:
                                                                                              • API String ID: 4033686569-0
                                                                                              • Opcode ID: 078dc1ab0cec9b89af95c1d6fc9f9c4663dbe8171d306d2f69e442ebdf79d100
                                                                                              • Instruction ID: c3bb171c7da52b82bb52bf33ff5940fbda7d1c7446d3b47285d17b43a1a3768b
                                                                                              • Opcode Fuzzy Hash: 078dc1ab0cec9b89af95c1d6fc9f9c4663dbe8171d306d2f69e442ebdf79d100
                                                                                              • Instruction Fuzzy Hash: 792181F250C6109FE7167E19EC857BAFBD8EF04320F16092EEAD583780EA3558508AD7
                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 02C3D9C5
                                                                                                • Part of subcall function 02C31A01: TlsGetValue.KERNEL32 ref: 02C31A0A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: H_prologValue
                                                                                              • String ID:
                                                                                              • API String ID: 3700342317-0
                                                                                              • Opcode ID: 754fccde7a03e3c15a4fea344aabe401fa9f1126b22b750d0a23c90d0de26bea
                                                                                              • Instruction ID: bb2847f7380c09f8073f9f3a4995c67ce1dfe1eb44f81d53fd61136b6da7fc74
                                                                                              • Opcode Fuzzy Hash: 754fccde7a03e3c15a4fea344aabe401fa9f1126b22b750d0a23c90d0de26bea
                                                                                              • Instruction Fuzzy Hash: 81215EB2904209AFDB01DFA9D940AEEBBF9FF48311F10452EE905A3240D770AA00DBA1
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C68000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C68000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c68000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileRead
                                                                                              • String ID:
                                                                                              • API String ID: 2738559852-0
                                                                                              • Opcode ID: 9196b47032be1b6f31a5ea62563ab329dfd520073f928f6b6f43fa315ea4c83c
                                                                                              • Instruction ID: fc755245c2709e786893501373d4b6329fa916518b4f9c43a228b3fff088e380
                                                                                              • Opcode Fuzzy Hash: 9196b47032be1b6f31a5ea62563ab329dfd520073f928f6b6f43fa315ea4c83c
                                                                                              • Instruction Fuzzy Hash: 590152B154C2109FE315AF19DC85BAABBE4EF18364F01492CE7C4C3650D6319850CBD7
                                                                                              APIs
                                                                                              • GetStartupInfoA.KERNEL32(0040BC70), ref: 004016FC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: InfoStartup
                                                                                              • String ID:
                                                                                              • API String ID: 2571198056-0
                                                                                              • Opcode ID: 617dcdd3924f5fd15f13347a6dd3b6e849656fb3a5ef12917dd247dd286985b5
                                                                                              • Instruction ID: 31549c42c345b13d2c96f02d54ffb13a9b858f0819e0063f9234c9623734f819
                                                                                              • Opcode Fuzzy Hash: 617dcdd3924f5fd15f13347a6dd3b6e849656fb3a5ef12917dd247dd286985b5
                                                                                              • Instruction Fuzzy Hash: 22F08130C48208EAE7248AC4DA4566A7670A704309F34043BE903392E0C3BD499AA6DF
                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 02C3D555
                                                                                                • Part of subcall function 02C326DB: RtlEnterCriticalSection.NTDLL(?), ref: 02C32706
                                                                                                • Part of subcall function 02C326DB: CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02C3272B
                                                                                                • Part of subcall function 02C326DB: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02C53163), ref: 02C32738
                                                                                                • Part of subcall function 02C326DB: SetWaitableTimer.KERNEL32(?,?,000493E0,00000000,00000000,00000000), ref: 02C32778
                                                                                                • Part of subcall function 02C326DB: RtlLeaveCriticalSection.NTDLL(?), ref: 02C327D9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                                              • String ID:
                                                                                              • API String ID: 4293676635-0
                                                                                              • Opcode ID: 56094ae8bb008a7eda9d69af968494dc6aabb330eda82b0f45f6b6663c410b53
                                                                                              • Instruction ID: 5b2cd6125ae6e520bc9977540af42f25a830dba542487e3d92b68d4ae6ad748d
                                                                                              • Opcode Fuzzy Hash: 56094ae8bb008a7eda9d69af968494dc6aabb330eda82b0f45f6b6663c410b53
                                                                                              • Instruction Fuzzy Hash: D20192B1900B149FC728CF1AC540956FBF5EF88314B15C6AE98498B721E771DA80CF95
                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 02C3D334
                                                                                                • Part of subcall function 02C427B5: _malloc.LIBCMT ref: 02C427CD
                                                                                                • Part of subcall function 02C3D550: __EH_prolog.LIBCMT ref: 02C3D555
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: H_prolog$_malloc
                                                                                              • String ID:
                                                                                              • API String ID: 4254904621-0
                                                                                              • Opcode ID: 020882338c45edc6ac49bbd0edffa75ec1f751d59df45d17c5fc8a39ff0b9897
                                                                                              • Instruction ID: d1db263d288e5a6b28d6dce77b79427eb01b00e9fe098bbd59b9ee3bdb3c5772
                                                                                              • Opcode Fuzzy Hash: 020882338c45edc6ac49bbd0edffa75ec1f751d59df45d17c5fc8a39ff0b9897
                                                                                              • Instruction Fuzzy Hash: CBE0C2B2A10105ABDB0EEFA8DC11B3EBBB2EB44300F0045ADBC0ED2340EF308A009A55
                                                                                              APIs
                                                                                                • Part of subcall function 02C448BA: __getptd_noexit.LIBCMT ref: 02C448BB
                                                                                                • Part of subcall function 02C448BA: __amsg_exit.LIBCMT ref: 02C448C8
                                                                                                • Part of subcall function 02C42493: __getptd_noexit.LIBCMT ref: 02C42497
                                                                                                • Part of subcall function 02C42493: __freeptd.LIBCMT ref: 02C424B1
                                                                                                • Part of subcall function 02C42493: RtlExitUserThread.NTDLL(?,00000000,?,02C42473,00000000), ref: 02C424BA
                                                                                              • __XcptFilter.LIBCMT ref: 02C4247F
                                                                                                • Part of subcall function 02C47944: __getptd_noexit.LIBCMT ref: 02C47948
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: __getptd_noexit$ExitFilterThreadUserXcpt__amsg_exit__freeptd
                                                                                              • String ID:
                                                                                              • API String ID: 1405322794-0
                                                                                              • Opcode ID: e78ae79d09ba92cecb3b3b2ab05dbe9a65e7bc0a3121039d9d7cecddbbf107be
                                                                                              • Instruction ID: 36212375aad66e967672dbe23efa99915409a41cc66b098267adc2083d850594
                                                                                              • Opcode Fuzzy Hash: e78ae79d09ba92cecb3b3b2ab05dbe9a65e7bc0a3121039d9d7cecddbbf107be
                                                                                              • Instruction Fuzzy Hash: C0E0ECB19046409FEB08ABB0D905F2FBBA6EF05315F200498F5019B271CF749944FE25
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: CopyFile
                                                                                              • String ID:
                                                                                              • API String ID: 1304948518-0
                                                                                              • Opcode ID: dd78076e89e0401475a98f819a82f565ff83797c348f56c25926e712a40ce359
                                                                                              • Instruction ID: c028c9eaedb9a86683d45d109f874a558c9250b022e562fbc3df51ab1a61a941
                                                                                              • Opcode Fuzzy Hash: dd78076e89e0401475a98f819a82f565ff83797c348f56c25926e712a40ce359
                                                                                              • Instruction Fuzzy Hash: EFB01224108102FED1212B900E08D36729C0C28B40321043A1843F00E0D57C500BB13F
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateDirectory
                                                                                              • String ID:
                                                                                              • API String ID: 4241100979-0
                                                                                              • Opcode ID: 23ddc9e5edd6b53e1b1f4136a39746dad269bd9863e41c38b4f669bc947767cf
                                                                                              • Instruction ID: a63d933562d00b84030e1b6afa52d7dc68db9c9b6ecb4b8aa01127f168707290
                                                                                              • Opcode Fuzzy Hash: 23ddc9e5edd6b53e1b1f4136a39746dad269bd9863e41c38b4f669bc947767cf
                                                                                              • Instruction Fuzzy Hash: 28A00235589621EBD58147A0DF099BD75545D0972D33240377EC3700E289BD041A6BDF
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExitProcess
                                                                                              • String ID:
                                                                                              • API String ID: 621844428-0
                                                                                              • Opcode ID: d0c3826ff0723c635ed91f33ee8e9590a4913c499c658fce5c591476c82bfad4
                                                                                              • Instruction ID: b1a92c03231e144544f713b417c5859e0f2de9157cf9fa8b01285a905142e745
                                                                                              • Opcode Fuzzy Hash: d0c3826ff0723c635ed91f33ee8e9590a4913c499c658fce5c591476c82bfad4
                                                                                              • Instruction Fuzzy Hash: 68A00261958701EAD38037F1EF0AF3939185B05746F15457BFA9BB40E58D7801095D3F
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: QueryValue
                                                                                              • String ID:
                                                                                              • API String ID: 3660427363-0
                                                                                              • Opcode ID: b391aa9fe3ea210b1cee81e040c1f758445676d51f93ab7188548a7420ecf128
                                                                                              • Instruction ID: 3bd42a71b03534167308f0cbd5da6460ad747fd4e0c7a7375ad2f4210d01ae57
                                                                                              • Opcode Fuzzy Hash: b391aa9fe3ea210b1cee81e040c1f758445676d51f93ab7188548a7420ecf128
                                                                                              • Instruction Fuzzy Hash: 059002246045019AE6104E315A08315255465847517A2483A5493E2060DA3880456519
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: Create
                                                                                              • String ID:
                                                                                              • API String ID: 2289755597-0
                                                                                              • Opcode ID: 383b7650d2ee7e5ada3e4db234f584aaabeebbe9374209253395a3b32b5a6f81
                                                                                              • Instruction ID: 07d2f82f72fc2e31263e526b7b5b13d85737a981482a0a25e669d48976ba73c6
                                                                                              • Opcode Fuzzy Hash: 383b7650d2ee7e5ada3e4db234f584aaabeebbe9374209253395a3b32b5a6f81
                                                                                              • Instruction Fuzzy Hash: 3C9002202045019BD2000A315E0871535546605749B1548395443E1060DA3680055919
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: Close
                                                                                              • String ID:
                                                                                              • API String ID: 3535843008-0
                                                                                              • Opcode ID: 8f007f69e061bd422a53f48b80ceed0a1a374071a83d77b918650b57a5cd535f
                                                                                              • Instruction ID: dec88964b932671aa77eca6bc69d32e9a32eec2e664996911c6cd1e039071611
                                                                                              • Opcode Fuzzy Hash: 8f007f69e061bd422a53f48b80ceed0a1a374071a83d77b918650b57a5cd535f
                                                                                              • Instruction Fuzzy Hash:
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: lstrcmpi
                                                                                              • String ID:
                                                                                              • API String ID: 1586166983-0
                                                                                              • Opcode ID: 85e5d253e75483d50bd31de290fb2bf395d6d4dd5cdd4da3a6f7b01d90c409f5
                                                                                              • Instruction ID: 0e395745e38f9bd276d1320349e90d054343714417637c74239275d290802098
                                                                                              • Opcode Fuzzy Hash: 85e5d253e75483d50bd31de290fb2bf395d6d4dd5cdd4da3a6f7b01d90c409f5
                                                                                              • Instruction Fuzzy Hash: C1115B34920615CBD750EF25EE887AA73B4FB0A341F1080B5D949B62A1C7389D4ADF4C
                                                                                              APIs
                                                                                                • Part of subcall function 02C40610: OpenEventA.KERNEL32(00100002,00000000,00000000,EBF17155), ref: 02C406B0
                                                                                                • Part of subcall function 02C40610: CloseHandle.KERNEL32(00000000), ref: 02C406C5
                                                                                                • Part of subcall function 02C40610: ResetEvent.KERNEL32(00000000,EBF17155), ref: 02C406CF
                                                                                                • Part of subcall function 02C40610: CloseHandle.KERNEL32(00000000,EBF17155), ref: 02C40704
                                                                                              • TlsSetValue.KERNEL32(0000002B,?), ref: 02C411AA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2547383765.0000000002C31000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C31000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_2c31000_megasoftdivxconverter.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CloseEventHandle$OpenResetValue
                                                                                              • String ID:
                                                                                              • API String ID: 1556185888-0
                                                                                              • Opcode ID: a78ad06a3050e032bea2aa16adefed646c9b23d5e6eed5cc34629eff91229aea
                                                                                              • Instruction ID: b3f38cc184f28fabf2151908864d01933dd00f1cd2ee1aeacd7e972b92c76a6e
                                                                                              • Opcode Fuzzy Hash: a78ad06a3050e032bea2aa16adefed646c9b23d5e6eed5cc34629eff91229aea
                                                                                              • Instruction Fuzzy Hash: BC01A271A44214AFD714CF59DC49B5BBBACEB05671F10472AF929E3380DB71A9008AE0
                                                                                              APIs
                                                                                              • VirtualAlloc.KERNEL32(00000000,?,00003000,00000040), ref: 0040DD00
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocVirtual
                                                                                              • String ID:
                                                                                              • API String ID: 4275171209-0
                                                                                              • Opcode ID: 5be6704718b93ff92afc96952609f6e6387096737fb5b7c84385c1961137f368
                                                                                              • Instruction ID: 3b205df3594c415d0aa8bec0432e9a599be535e783554e68ad17295cc5f33824
                                                                                              • Opcode Fuzzy Hash: 5be6704718b93ff92afc96952609f6e6387096737fb5b7c84385c1961137f368
                                                                                              • Instruction Fuzzy Hash: 5ED09274A44204EFEB048FD4D895BADBFB0BB08700F10106AE601BA290D37569819B19
                                                                                              APIs
                                                                                              • VirtualAlloc.KERNEL32(00000000,?,00003000,00000040), ref: 0040DD00
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocVirtual
                                                                                              • String ID:
                                                                                              • API String ID: 4275171209-0
                                                                                              • Opcode ID: 8b23f1f67c5f5566f300e7ac74bae4201891eaa614364e91549a7b481efbae26
                                                                                              • Instruction ID: 8af6f96ece145710be5535b4e3cdc8dee21da37ab7613c5e1b542e0a2ec452ac
                                                                                              • Opcode Fuzzy Hash: 8b23f1f67c5f5566f300e7ac74bae4201891eaa614364e91549a7b481efbae26
                                                                                              • Instruction Fuzzy Hash: 64D0C9B4C05115EFC7048FA4954416CBAB4AF15340720143A9882B6251D33816099B1A
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: Sleep
                                                                                              • String ID:
                                                                                              • API String ID: 3472027048-0
                                                                                              • Opcode ID: 1b0567d54f0c0edf03da95ed6b3a6a73757f0bdfb125eac6e6710510bc4a4ac9
                                                                                              • Instruction ID: 00643d4d7351e9e5a350d6ed7ca8ab589594b51d6e4f39196c4da74e668ef2ca
                                                                                              • Opcode Fuzzy Hash: 1b0567d54f0c0edf03da95ed6b3a6a73757f0bdfb125eac6e6710510bc4a4ac9
                                                                                              • Instruction Fuzzy Hash: 8AC002B0A44544EFDB459BB8CE49E6DBBB8AB44300B1101A1F905F61A5CB389F49AA19
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: Sleep
                                                                                              • String ID:
                                                                                              • API String ID: 3472027048-0
                                                                                              • Opcode ID: 18d500e894f671b989adec932e8be24e82ce215b7d72d1c5409f2e9720ba9509
                                                                                              • Instruction ID: 9f60c22d136c83975ad332161802ba9d1f8d3b96565a4f4b2bdefaede1a81fb0
                                                                                              • Opcode Fuzzy Hash: 18d500e894f671b989adec932e8be24e82ce215b7d72d1c5409f2e9720ba9509
                                                                                              • Instruction Fuzzy Hash: 82B012B8699B0397E3141A68AE2976417604F007A4F211837E707F84E0CBBEE146592E
                                                                                              APIs
                                                                                              • sqlite3_malloc.SQLITE3 ref: 609674C6
                                                                                                • Part of subcall function 60916FBA: sqlite3_initialize.SQLITE3(60912743,?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5), ref: 60916FC4
                                                                                                • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                                                                • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                                                                • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                                                              • sqlite3_step.SQLITE3 ref: 6096755A
                                                                                              • sqlite3_malloc.SQLITE3 ref: 6096783A
                                                                                              • sqlite3_bind_int64.SQLITE3 ref: 609678A8
                                                                                              • sqlite3_column_bytes.SQLITE3 ref: 609678E8
                                                                                              • sqlite3_column_blob.SQLITE3 ref: 60967901
                                                                                              • sqlite3_column_int64.SQLITE3 ref: 6096791A
                                                                                              • sqlite3_column_int64.SQLITE3 ref: 60967931
                                                                                              • sqlite3_column_int64.SQLITE3 ref: 60967950
                                                                                              • sqlite3_step.SQLITE3 ref: 609679C3
                                                                                              • sqlite3_bind_int64.SQLITE3 ref: 60967AA9
                                                                                              • sqlite3_step.SQLITE3 ref: 60967AB4
                                                                                              • sqlite3_column_int.SQLITE3 ref: 60967AC7
                                                                                              • sqlite3_reset.SQLITE3 ref: 60967AD4
                                                                                              • sqlite3_bind_int.SQLITE3 ref: 60967B89
                                                                                              • sqlite3_step.SQLITE3 ref: 60967B94
                                                                                              • sqlite3_column_int64.SQLITE3 ref: 60967BB0
                                                                                              • sqlite3_column_int64.SQLITE3 ref: 60967BCF
                                                                                              • sqlite3_column_int64.SQLITE3 ref: 60967BE6
                                                                                              • sqlite3_column_bytes.SQLITE3 ref: 60967C05
                                                                                              • sqlite3_column_blob.SQLITE3 ref: 60967C1E
                                                                                                • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED50
                                                                                              • sqlite3_bind_int64.SQLITE3 ref: 60967C72
                                                                                              • sqlite3_step.SQLITE3 ref: 60967C7D
                                                                                              • memcmp.MSVCRT ref: 60967D4C
                                                                                              • sqlite3_free.SQLITE3 ref: 60967D69
                                                                                              • sqlite3_free.SQLITE3 ref: 60967D74
                                                                                              • sqlite3_free.SQLITE3 ref: 60967FF7
                                                                                              • sqlite3_free.SQLITE3 ref: 60968002
                                                                                                • Part of subcall function 609634F0: sqlite3_blob_reopen.SQLITE3 ref: 60963510
                                                                                                • Part of subcall function 609634F0: sqlite3_blob_bytes.SQLITE3 ref: 609635A3
                                                                                                • Part of subcall function 609634F0: sqlite3_malloc.SQLITE3 ref: 609635BB
                                                                                                • Part of subcall function 609634F0: sqlite3_blob_read.SQLITE3 ref: 60963602
                                                                                                • Part of subcall function 609634F0: sqlite3_free.SQLITE3 ref: 60963621
                                                                                              • sqlite3_reset.SQLITE3 ref: 60967C93
                                                                                                • Part of subcall function 60941C40: sqlite3_mutex_enter.SQLITE3 ref: 60941C58
                                                                                                • Part of subcall function 60941C40: sqlite3_mutex_leave.SQLITE3 ref: 60941CBE
                                                                                              • sqlite3_reset.SQLITE3 ref: 60967CA7
                                                                                              • sqlite3_reset.SQLITE3 ref: 60968035
                                                                                              • sqlite3_bind_int64.SQLITE3 ref: 60967B72
                                                                                                • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                              • sqlite3_bind_int64.SQLITE3 ref: 6096809D
                                                                                              • sqlite3_bind_int64.SQLITE3 ref: 609680C6
                                                                                              • sqlite3_step.SQLITE3 ref: 609680D1
                                                                                              • sqlite3_column_int.SQLITE3 ref: 609680F3
                                                                                              • sqlite3_reset.SQLITE3 ref: 60968104
                                                                                              • sqlite3_step.SQLITE3 ref: 60968139
                                                                                              • sqlite3_column_int64.SQLITE3 ref: 60968151
                                                                                              • sqlite3_reset.SQLITE3 ref: 6096818A
                                                                                                • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED2B
                                                                                                • Part of subcall function 6095ECA6: sqlite3_bind_value.SQLITE3 ref: 6095EDDF
                                                                                              • sqlite3_reset.SQLITE3 ref: 609679E9
                                                                                                • Part of subcall function 609160CD: sqlite3_realloc.SQLITE3 ref: 609160EF
                                                                                              • sqlite3_column_bytes.SQLITE3 ref: 60967587
                                                                                                • Part of subcall function 6091D5DC: sqlite3_value_bytes.SQLITE3 ref: 6091D5F4
                                                                                              • sqlite3_column_blob.SQLITE3 ref: 60967572
                                                                                                • Part of subcall function 6091D57E: sqlite3_value_blob.SQLITE3 ref: 6091D596
                                                                                              • sqlite3_reset.SQLITE3 ref: 609675B7
                                                                                              • sqlite3_bind_int.SQLITE3 ref: 60967641
                                                                                              • sqlite3_step.SQLITE3 ref: 6096764C
                                                                                              • sqlite3_column_int64.SQLITE3 ref: 6096766E
                                                                                              • sqlite3_reset.SQLITE3 ref: 6096768B
                                                                                              • sqlite3_bind_int.SQLITE3 ref: 6096754F
                                                                                                • Part of subcall function 609256E5: sqlite3_bind_int64.SQLITE3 ref: 60925704
                                                                                              • sqlite3_bind_int.SQLITE3 ref: 609690B2
                                                                                              • sqlite3_bind_blob.SQLITE3 ref: 609690DB
                                                                                              • sqlite3_step.SQLITE3 ref: 609690E6
                                                                                              • sqlite3_reset.SQLITE3 ref: 609690F1
                                                                                              • sqlite3_free.SQLITE3 ref: 60969102
                                                                                              • sqlite3_free.SQLITE3 ref: 6096910D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_reset$sqlite3_step$sqlite3_column_int64sqlite3_free$sqlite3_bind_int64$sqlite3_bind_int$sqlite3_column_blobsqlite3_column_bytessqlite3_mallocsqlite3_mprintf$sqlite3_column_intsqlite3_mutex_leave$memcmpsqlite3_bind_blobsqlite3_bind_valuesqlite3_blob_bytessqlite3_blob_readsqlite3_blob_reopensqlite3_initializesqlite3_mutex_entersqlite3_prepare_v2sqlite3_reallocsqlite3_value_blobsqlite3_value_bytes
                                                                                              • String ID: $d
                                                                                              • API String ID: 2451604321-2084297493
                                                                                              • Opcode ID: 8a4e51d2763d1baa8146902d495da2ef892242416c9706ebfa3093aedc646825
                                                                                              • Instruction ID: 6b7ea73e19bc996eb6a422b8fcf26663d3cb25e4dd91ceba81a4d6a678ae72ab
                                                                                              • Opcode Fuzzy Hash: 8a4e51d2763d1baa8146902d495da2ef892242416c9706ebfa3093aedc646825
                                                                                              • Instruction Fuzzy Hash: 2CF2CF74A152288FDB54CF68C980B9EBBF2BF69304F1185A9E888A7341D774ED85CF41
                                                                                              APIs
                                                                                              • sqlite3_value_text.SQLITE3 ref: 6096A64C
                                                                                              • sqlite3_value_bytes.SQLITE3 ref: 6096A656
                                                                                              • sqlite3_strnicmp.SQLITE3 ref: 6096A682
                                                                                              • sqlite3_strnicmp.SQLITE3 ref: 6096A6BC
                                                                                              • sqlite3_mprintf.SQLITE3 ref: 6096A6F9
                                                                                              • sqlite3_malloc.SQLITE3 ref: 6096A754
                                                                                              • sqlite3_step.SQLITE3 ref: 6096A969
                                                                                              • sqlite3_free.SQLITE3 ref: 6096A9AC
                                                                                              • sqlite3_finalize.SQLITE3 ref: 6096A9BB
                                                                                              • sqlite3_strnicmp.SQLITE3 ref: 6096B04A
                                                                                                • Part of subcall function 6096A38C: sqlite3_bind_int.SQLITE3 ref: 6096A3DE
                                                                                                • Part of subcall function 6096A38C: sqlite3_step.SQLITE3 ref: 6096A435
                                                                                                • Part of subcall function 6096A38C: sqlite3_reset.SQLITE3 ref: 6096A445
                                                                                              • sqlite3_value_int.SQLITE3 ref: 6096B241
                                                                                              • sqlite3_malloc.SQLITE3 ref: 6096B270
                                                                                              • sqlite3_bind_null.SQLITE3 ref: 6096B2DF
                                                                                              • sqlite3_step.SQLITE3 ref: 6096B2EA
                                                                                              • sqlite3_reset.SQLITE3 ref: 6096B2F5
                                                                                              • sqlite3_value_int.SQLITE3 ref: 6096B43B
                                                                                              • sqlite3_value_text.SQLITE3 ref: 6096B530
                                                                                              • sqlite3_value_bytes.SQLITE3 ref: 6096B576
                                                                                              • sqlite3_free.SQLITE3 ref: 6096B5F4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_stepsqlite3_strnicmp$sqlite3_freesqlite3_mallocsqlite3_resetsqlite3_value_bytessqlite3_value_intsqlite3_value_text$sqlite3_bind_intsqlite3_bind_nullsqlite3_finalizesqlite3_mprintf
                                                                                              • String ID: optimize
                                                                                              • API String ID: 1540667495-3797040228
                                                                                              • Opcode ID: ab382b16e3f59fac809a38361d516dac1e6c4c02a096abfb60effccae4f38c9b
                                                                                              • Instruction ID: 15d53f9c7948a495e2c6926a79545eea34293df74e7a3e63ea56b3727437b729
                                                                                              • Opcode Fuzzy Hash: ab382b16e3f59fac809a38361d516dac1e6c4c02a096abfb60effccae4f38c9b
                                                                                              • Instruction Fuzzy Hash: 54B2F670A142198FEB14DF68C890B9DBBF6BF68304F1085A9E889AB351E774DD85CF41
                                                                                              APIs
                                                                                              • sqlite3_finalize.SQLITE3 ref: 60966178
                                                                                              • sqlite3_free.SQLITE3 ref: 60966183
                                                                                              • sqlite3_value_numeric_type.SQLITE3 ref: 609661AE
                                                                                              • sqlite3_value_numeric_type.SQLITE3 ref: 609661DE
                                                                                              • sqlite3_value_text.SQLITE3 ref: 60966236
                                                                                              • sqlite3_value_int.SQLITE3 ref: 60966274
                                                                                              • memcmp.MSVCRT ref: 6096639E
                                                                                                • Part of subcall function 60940A5B: sqlite3_malloc.SQLITE3 ref: 60940AA1
                                                                                                • Part of subcall function 60940A5B: sqlite3_free.SQLITE3 ref: 60940C1D
                                                                                              • sqlite3_mprintf.SQLITE3 ref: 60966B51
                                                                                              • sqlite3_mprintf.SQLITE3 ref: 60966B7D
                                                                                                • Part of subcall function 609296AA: sqlite3_initialize.SQLITE3 ref: 609296B0
                                                                                                • Part of subcall function 609296AA: sqlite3_vmprintf.SQLITE3 ref: 609296CA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_freesqlite3_mprintfsqlite3_value_numeric_type$memcmpsqlite3_finalizesqlite3_initializesqlite3_mallocsqlite3_value_intsqlite3_value_textsqlite3_vmprintf
                                                                                              • String ID: ASC$DESC$x
                                                                                              • API String ID: 4082667235-1162196452
                                                                                              • Opcode ID: 7264e4280a4ba67b830c3238f8418230a53be4a89f04bb086879d88682624c0f
                                                                                              • Instruction ID: 01f4316cc9c65235d83944c747b96ccca9397e1276bdc6c450b31a73d7ca280a
                                                                                              • Opcode Fuzzy Hash: 7264e4280a4ba67b830c3238f8418230a53be4a89f04bb086879d88682624c0f
                                                                                              • Instruction Fuzzy Hash: AD921274A14319CFEB10CFA9C99079DBBB6BF69304F20816AD858AB342D774E985CF41
                                                                                              APIs
                                                                                              • sqlite3_bind_int64.SQLITE3(?,?), ref: 609693A5
                                                                                              • sqlite3_step.SQLITE3(?,?), ref: 609693B0
                                                                                              • sqlite3_column_int64.SQLITE3(?,?), ref: 609693DC
                                                                                                • Part of subcall function 6096A2BD: sqlite3_bind_int64.SQLITE3 ref: 6096A322
                                                                                                • Part of subcall function 6096A2BD: sqlite3_step.SQLITE3 ref: 6096A32D
                                                                                                • Part of subcall function 6096A2BD: sqlite3_column_int.SQLITE3 ref: 6096A347
                                                                                                • Part of subcall function 6096A2BD: sqlite3_reset.SQLITE3 ref: 6096A354
                                                                                              • sqlite3_reset.SQLITE3(?,?), ref: 609693F3
                                                                                              • sqlite3_malloc.SQLITE3(?), ref: 60969561
                                                                                              • sqlite3_malloc.SQLITE3(?), ref: 6096958D
                                                                                              • sqlite3_step.SQLITE3(?), ref: 609695D2
                                                                                              • sqlite3_column_int64.SQLITE3(?), ref: 609695EA
                                                                                              • sqlite3_reset.SQLITE3(?), ref: 60969604
                                                                                              • sqlite3_realloc.SQLITE3(?), ref: 609697D0
                                                                                              • sqlite3_realloc.SQLITE3(?), ref: 609698A9
                                                                                                • Part of subcall function 609129D5: sqlite3_initialize.SQLITE3(?,?,?,60915F55,?,?,?,?,?,?,00000000,?,?,?,60915FE2,00000000), ref: 609129E0
                                                                                              • sqlite3_bind_int64.SQLITE3(?,?), ref: 609699B8
                                                                                              • sqlite3_bind_int64.SQLITE3(?), ref: 6096934D
                                                                                                • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                              • sqlite3_bind_int64.SQLITE3(?,?), ref: 60969A6A
                                                                                              • sqlite3_step.SQLITE3(?,?), ref: 60969A75
                                                                                              • sqlite3_reset.SQLITE3(?,?), ref: 60969A80
                                                                                              • sqlite3_free.SQLITE3(?), ref: 60969D41
                                                                                              • sqlite3_free.SQLITE3(?), ref: 60969D4C
                                                                                              • sqlite3_free.SQLITE3(?), ref: 60969D5B
                                                                                                • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                                                                • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                                                                • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_bind_int64$sqlite3_freesqlite3_resetsqlite3_step$sqlite3_column_int64sqlite3_mallocsqlite3_realloc$sqlite3_column_intsqlite3_initializesqlite3_mprintfsqlite3_mutex_leavesqlite3_prepare_v2
                                                                                              • String ID:
                                                                                              • API String ID: 961572588-0
                                                                                              • Opcode ID: c724daf3936d67fd3e7a59374d144345718a9f8d9c21f3c7abba70c9fa35c0f4
                                                                                              • Instruction ID: dba6eef834311e7f80380fc62c490a647dd1765b4da9a7e0a506f520bf28697a
                                                                                              • Opcode Fuzzy Hash: c724daf3936d67fd3e7a59374d144345718a9f8d9c21f3c7abba70c9fa35c0f4
                                                                                              • Instruction Fuzzy Hash: 9872F275A042298FDB24CF69C88078DB7F6FF98314F1586A9D889AB341D774AD81CF81
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_bind_int64sqlite3_mutex_leavesqlite3_stricmp
                                                                                              • String ID: 2$foreign key$indexed
                                                                                              • API String ID: 4126863092-702264400
                                                                                              • Opcode ID: efb0247afb620838301bdf32ec29a55ffab8ab84c5461d6934eb6e15b590f11f
                                                                                              • Instruction ID: 3d5d194cd292e354de8359ea213fef7e5121ae3f60f7d2d7ba557b44893e8b9c
                                                                                              • Opcode Fuzzy Hash: efb0247afb620838301bdf32ec29a55ffab8ab84c5461d6934eb6e15b590f11f
                                                                                              • Instruction Fuzzy Hash: 6BE1B374A142099FDB04CFA8D590A9DBBF2BFA9304F21C129E855AB754DB35ED82CF40
                                                                                              APIs
                                                                                              • sqlite3_bind_int64.SQLITE3 ref: 6094A72B
                                                                                              • sqlite3_step.SQLITE3 ref: 6094A73C
                                                                                              • sqlite3_column_blob.SQLITE3 ref: 6094A760
                                                                                              • sqlite3_column_bytes.SQLITE3 ref: 6094A77C
                                                                                              • sqlite3_malloc.SQLITE3 ref: 6094A793
                                                                                              • sqlite3_reset.SQLITE3 ref: 6094A7F2
                                                                                              • sqlite3_free.SQLITE3(?), ref: 6094A87C
                                                                                                • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_bind_int64sqlite3_column_blobsqlite3_column_bytessqlite3_freesqlite3_mallocsqlite3_mutex_entersqlite3_resetsqlite3_step
                                                                                              • String ID:
                                                                                              • API String ID: 2794791986-0
                                                                                              • Opcode ID: 324244e72ed1eb068e97444324dd06558e7f5640642cd65f7376e38a8826fd77
                                                                                              • Instruction ID: 088d5e00ded46b3eb5457b54e5d33bc48436a4b712d77f6ae5dc1ca3eb859b7b
                                                                                              • Opcode Fuzzy Hash: 324244e72ed1eb068e97444324dd06558e7f5640642cd65f7376e38a8826fd77
                                                                                              • Instruction Fuzzy Hash: BE5110B5A042058FCB04CF69C48069ABBF6FF68318F158569E858AB345D734EC82CF90
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_stricmp
                                                                                              • String ID: USING COVERING INDEX $DISTINCT$ORDER BY
                                                                                              • API String ID: 912767213-1308749736
                                                                                              • Opcode ID: 5e6ae8a77223c4cf3853263767bd84c2ef0a0cb2633a4755bdfaa367f33b2fd5
                                                                                              • Instruction ID: 4f43644a9add5c5df618cbd47cd61ce2203d262f2077f605e752fe25420d36ab
                                                                                              • Opcode Fuzzy Hash: 5e6ae8a77223c4cf3853263767bd84c2ef0a0cb2633a4755bdfaa367f33b2fd5
                                                                                              • Instruction Fuzzy Hash: 2412D674A08268CFDB25DF28C880B5AB7B3AFA9314F1085E9E8899B355D774DD81CF41
                                                                                              APIs
                                                                                              • sqlite3_bind_int64.SQLITE3 ref: 6094B488
                                                                                              • sqlite3_step.SQLITE3 ref: 6094B496
                                                                                              • sqlite3_reset.SQLITE3 ref: 6094B4A4
                                                                                              • sqlite3_bind_int64.SQLITE3 ref: 6094B4D2
                                                                                              • sqlite3_step.SQLITE3 ref: 6094B4E0
                                                                                              • sqlite3_reset.SQLITE3 ref: 6094B4EE
                                                                                                • Part of subcall function 6094B54C: memmove.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,6094B44B), ref: 6094B6B5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_bind_int64sqlite3_resetsqlite3_step$memmove
                                                                                              • String ID:
                                                                                              • API String ID: 4082478743-0
                                                                                              • Opcode ID: aa77e302053f557c70a8d8c80c1bb3ccc0b69d7e46be98bddd9db9cb48891f7f
                                                                                              • Instruction ID: 9e7f29540a3c6f2d28ce6b101cd1a975f5529a8f599b89b7128c34d749e8d9ce
                                                                                              • Opcode Fuzzy Hash: aa77e302053f557c70a8d8c80c1bb3ccc0b69d7e46be98bddd9db9cb48891f7f
                                                                                              • Instruction Fuzzy Hash: DD41D2B4A087018FCB50DF69C484A9EB7F6EFA8364F158929EC99CB315E734E8418F51
                                                                                              APIs
                                                                                              • sqlite3_mutex_enter.SQLITE3 ref: 6094D354
                                                                                              • sqlite3_mutex_leave.SQLITE3 ref: 6094D546
                                                                                                • Part of subcall function 60905D76: sqlite3_stricmp.SQLITE3 ref: 60905D8B
                                                                                                • Part of subcall function 60905D76: sqlite3_stricmp.SQLITE3 ref: 60905DA4
                                                                                                • Part of subcall function 60905D76: sqlite3_stricmp.SQLITE3 ref: 60905DB8
                                                                                              • sqlite3_stricmp.SQLITE3 ref: 6094D3DA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_stricmp$sqlite3_mutex_entersqlite3_mutex_leave
                                                                                              • String ID: BINARY$INTEGER
                                                                                              • API String ID: 317512412-1676293250
                                                                                              • Opcode ID: a7efc97792d1e6a4bc5cda92ab6d03f9066f32250883ff14ac0274f07e3e06bf
                                                                                              • Instruction ID: cace79839434994537c0410bddb438ad3d501bddbf1b20fcc6a8a8bdb5da7fdd
                                                                                              • Opcode Fuzzy Hash: a7efc97792d1e6a4bc5cda92ab6d03f9066f32250883ff14ac0274f07e3e06bf
                                                                                              • Instruction Fuzzy Hash: 8E712978A056099BDB05CF69C49079EBBF2BFA8308F11C529EC55AB3A4D734E941CF80
                                                                                              APIs
                                                                                              • sqlite3_bind_int64.SQLITE3 ref: 6094B582
                                                                                              • sqlite3_step.SQLITE3 ref: 6094B590
                                                                                              • sqlite3_column_int64.SQLITE3 ref: 6094B5AD
                                                                                              • sqlite3_reset.SQLITE3 ref: 6094B5EE
                                                                                              • memmove.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,6094B44B), ref: 6094B6B5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: memmovesqlite3_bind_int64sqlite3_column_int64sqlite3_resetsqlite3_step
                                                                                              • String ID:
                                                                                              • API String ID: 2802900177-0
                                                                                              • Opcode ID: f7dd783d858009ac2aa36dfb06bc3a4e86bc75c1920f7d1bf53ec4d0fe99899e
                                                                                              • Instruction ID: fa681a173a9aa7ad5377a8f3376375fc0286f70c891b696e42c92f52458a3a0e
                                                                                              • Opcode Fuzzy Hash: f7dd783d858009ac2aa36dfb06bc3a4e86bc75c1920f7d1bf53ec4d0fe99899e
                                                                                              • Instruction Fuzzy Hash: 0B517D75A082018FCB14CF69C48169EF7F7FBA8314F25C669D8499B318EA74EC81CB81
                                                                                              APIs
                                                                                              • sqlite3_mutex_enter.SQLITE3 ref: 6093F443
                                                                                                • Part of subcall function 60904396: sqlite3_mutex_try.SQLITE3(?,?,?,60908235), ref: 609043B8
                                                                                              • sqlite3_mutex_enter.SQLITE3 ref: 6093F45C
                                                                                                • Part of subcall function 60939559: memcmp.MSVCRT ref: 60939694
                                                                                                • Part of subcall function 60939559: memcmp.MSVCRT ref: 609396CA
                                                                                              • sqlite3_mutex_leave.SQLITE3 ref: 6093F8CD
                                                                                              • sqlite3_mutex_leave.SQLITE3 ref: 6093F8E3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcmpsqlite3_mutex_entersqlite3_mutex_leave$sqlite3_mutex_try
                                                                                              • String ID:
                                                                                              • API String ID: 4038589952-0
                                                                                              • Opcode ID: 29e5932b9866e1e5e2fcd92ac707fe98724786dada8c9b11deae4621e05e1fb7
                                                                                              • Instruction ID: 916146ddc5613ce70bfe97dc7fabc38680eb49f4f4fdba01105907ea2da9c682
                                                                                              • Opcode Fuzzy Hash: 29e5932b9866e1e5e2fcd92ac707fe98724786dada8c9b11deae4621e05e1fb7
                                                                                              • Instruction Fuzzy Hash: 87F13674A046158FDB18CFA9C590A9EB7F7AFA8308F248429E846AB355D774EC42CF40
                                                                                              APIs
                                                                                                • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                                                                • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                                                                • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                                                              • sqlite3_bind_int.SQLITE3 ref: 6096A3DE
                                                                                                • Part of subcall function 609256E5: sqlite3_bind_int64.SQLITE3 ref: 60925704
                                                                                              • sqlite3_column_int.SQLITE3 ref: 6096A3F3
                                                                                              • sqlite3_step.SQLITE3 ref: 6096A435
                                                                                              • sqlite3_reset.SQLITE3 ref: 6096A445
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_bind_intsqlite3_bind_int64sqlite3_column_intsqlite3_freesqlite3_mprintfsqlite3_prepare_v2sqlite3_resetsqlite3_step
                                                                                              • String ID:
                                                                                              • API String ID: 247099642-0
                                                                                              • Opcode ID: 64427881e425bd4a7d2fa305579facb0dd1ab8a71ce9f1271cd8f49c57a97bec
                                                                                              • Instruction ID: 69535c0605dcb565d56369453fd68d3a3097adfd173720c6e67b3d4aca8354ad
                                                                                              • Opcode Fuzzy Hash: 64427881e425bd4a7d2fa305579facb0dd1ab8a71ce9f1271cd8f49c57a97bec
                                                                                              • Instruction Fuzzy Hash: FF2151B0A143148BEB109FA9D88479EB7FAEF64308F00852DE89597350EBB8D845CF51
                                                                                              APIs
                                                                                                • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                                                                • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                                                                • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                                                              • sqlite3_bind_int64.SQLITE3 ref: 6096A322
                                                                                                • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                              • sqlite3_step.SQLITE3 ref: 6096A32D
                                                                                              • sqlite3_column_int.SQLITE3 ref: 6096A347
                                                                                                • Part of subcall function 6091D4F4: sqlite3_value_int.SQLITE3 ref: 6091D50C
                                                                                              • sqlite3_reset.SQLITE3 ref: 6096A354
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_bind_int64sqlite3_column_intsqlite3_freesqlite3_mprintfsqlite3_mutex_leavesqlite3_prepare_v2sqlite3_resetsqlite3_stepsqlite3_value_int
                                                                                              • String ID:
                                                                                              • API String ID: 326482775-0
                                                                                              • Opcode ID: de94f0bba3b8b54078f1ceecce583a965f8e010bb36370f6070bcd8bc28ee8b0
                                                                                              • Instruction ID: 7c1586c82cd56d85cf32929a5cd575737867df940847ca2bf63216634e784e33
                                                                                              • Opcode Fuzzy Hash: de94f0bba3b8b54078f1ceecce583a965f8e010bb36370f6070bcd8bc28ee8b0
                                                                                              • Instruction Fuzzy Hash: 0E214DB0A043049BDB04DFA9C480B9EF7FAEFA8354F04C429E8959B340E778D8418B51
                                                                                              APIs
                                                                                              • CreateServiceA.ADVAPI32 ref: 00401E0D
                                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 004020C4
                                                                                              • CloseServiceHandle.ADVAPI32(?), ref: 0040210E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: Service$CloseHandle$Create
                                                                                              • String ID:
                                                                                              • API String ID: 2095555506-0
                                                                                              • Opcode ID: a6e85947b33a7f6093cd8a2a0f4612336bf4b8c13e80cc161daf887e4913ee24
                                                                                              • Instruction ID: 172d89795d36c8fd0b20b48b84415c8176c638fc19348775b287c5a316e7eea8
                                                                                              • Opcode Fuzzy Hash: a6e85947b33a7f6093cd8a2a0f4612336bf4b8c13e80cc161daf887e4913ee24
                                                                                              • Instruction Fuzzy Hash: 99D01231C08124E9CA1047914E9867A3D656708324F310477E247760D0C6BE584AF96E
                                                                                              APIs
                                                                                              • sqlite3_mutex_enter.SQLITE3 ref: 6090C1EA
                                                                                              • sqlite3_mutex_leave.SQLITE3 ref: 6090C22F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_mutex_entersqlite3_mutex_leave
                                                                                              • String ID:
                                                                                              • API String ID: 1477753154-0
                                                                                              • Opcode ID: 8c595cf50166d2d57a1b46d7a61a8743a20f226779b5cb212a2500e19f50b056
                                                                                              • Instruction ID: fc120f7ed3300d8301d0f99cb769197b575d5683181bd6b289e4b53452841bc5
                                                                                              • Opcode Fuzzy Hash: 8c595cf50166d2d57a1b46d7a61a8743a20f226779b5cb212a2500e19f50b056
                                                                                              • Instruction Fuzzy Hash: 6501F4715042548BDB449F2EC4C576EBBEAEF65318F048469DD419B326D374D882CBA1
                                                                                              APIs
                                                                                                • Part of subcall function 6092535E: sqlite3_log.SQLITE3 ref: 60925406
                                                                                              • sqlite3_mutex_leave.SQLITE3 ref: 609255B2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_logsqlite3_mutex_leave
                                                                                              • String ID:
                                                                                              • API String ID: 1465156292-0
                                                                                              • Opcode ID: 61f2b65abbb078f396bfa931b2809e4962fa985140118a0fa907d432528e7d54
                                                                                              • Instruction ID: 19c4c58ecb434a21204d9b38047e93a23a7f28015e8477a734fda6841bb58fe8
                                                                                              • Opcode Fuzzy Hash: 61f2b65abbb078f396bfa931b2809e4962fa985140118a0fa907d432528e7d54
                                                                                              • Instruction Fuzzy Hash: 56317AB4A082188FCB04DF69D880A8EBBF6FF99314F008559FC5897348D734D940CBA5
                                                                                              APIs
                                                                                                • Part of subcall function 6092535E: sqlite3_log.SQLITE3 ref: 60925406
                                                                                              • sqlite3_mutex_leave.SQLITE3 ref: 60925508
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_logsqlite3_mutex_leave
                                                                                              • String ID:
                                                                                              • API String ID: 1465156292-0
                                                                                              • Opcode ID: 7f15987c0945e0fd4273a36fcce91cc0d916abb620506d2e7fdad6d0c82ef640
                                                                                              • Instruction ID: ad89f0bb34aa7175efe61e1ac22fb0c12735e6005c3b9edbf096fd229bca234b
                                                                                              • Opcode Fuzzy Hash: 7f15987c0945e0fd4273a36fcce91cc0d916abb620506d2e7fdad6d0c82ef640
                                                                                              • Instruction Fuzzy Hash: 5A01A475B107148BCB109F2ACC8164BBBFAEF68254F05991AEC41DB315D775ED458BC0
                                                                                              APIs
                                                                                                • Part of subcall function 6092535E: sqlite3_log.SQLITE3 ref: 60925406
                                                                                              • sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_logsqlite3_mutex_leave
                                                                                              • String ID:
                                                                                              • API String ID: 1465156292-0
                                                                                              • Opcode ID: ebbe32869a67294cb2d54c108597a832b3743d43329dcf341f64f2493053d601
                                                                                              • Instruction ID: 4fd0dfe8dd6226820e052206e0db6187a6d8a97f2116fb4a305c2fd2856f8961
                                                                                              • Opcode Fuzzy Hash: ebbe32869a67294cb2d54c108597a832b3743d43329dcf341f64f2493053d601
                                                                                              • Instruction Fuzzy Hash: 94F08CB5A002099BCB00DF2AD88088ABBBAFF98264B05952AEC049B314D770E941CBD0
                                                                                              APIs
                                                                                              • StartServiceCtrlDispatcherA.ADVAPI32 ref: 0040195C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: CtrlDispatcherServiceStart
                                                                                              • String ID:
                                                                                              • API String ID: 3789849863-0
                                                                                              • Opcode ID: 6025db5b71d771838bf7cc09a6a207edf828ecfeb1793f0efe1d8128e1b5b071
                                                                                              • Instruction ID: 568fef085b6db665f5d8ca5109a2700c477ffcc1737381a00654577e9fc9af83
                                                                                              • Opcode Fuzzy Hash: 6025db5b71d771838bf7cc09a6a207edf828ecfeb1793f0efe1d8128e1b5b071
                                                                                              • Instruction Fuzzy Hash: 97E08C6221C28458C3110B312E9937B7E949217301B18147AC89AF01D3C2BCC886F629
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 5c5aa561fe8b7943dde2a358ba30c2c8876ef78bddd50c77f68009583e67d90a
                                                                                              • Instruction ID: 29002ccca7877ead4b7e7e784383ace88c03f26ddf616943a2b43c0eb71ea2e3
                                                                                              • Opcode Fuzzy Hash: 5c5aa561fe8b7943dde2a358ba30c2c8876ef78bddd50c77f68009583e67d90a
                                                                                              • Instruction Fuzzy Hash: 36E0E2B850430DABDF00CF09D8C188A7BAAFB08364F10C119FC190B305C371E9548BA1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: d3c407e99ff1326d716251d27052f3514f6d3ace0f30ccd24b81610f61b1d9b8
                                                                                              • Instruction ID: aa639d4c52eda77921d109c173628d401b16d57fa3137d2b917a91732d8775c8
                                                                                              • Opcode Fuzzy Hash: d3c407e99ff1326d716251d27052f3514f6d3ace0f30ccd24b81610f61b1d9b8
                                                                                              • Instruction Fuzzy Hash: D7C01265704208574B00E92DE8C154577AA9718164B108039E80B87301D975ED084291
                                                                                              APIs
                                                                                              • sqlite3_initialize.SQLITE3 ref: 6096C5BE
                                                                                                • Part of subcall function 60912453: sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 609124D1
                                                                                              • sqlite3_log.SQLITE3 ref: 6096C5FC
                                                                                              • sqlite3_free.SQLITE3 ref: 6096C67E
                                                                                              • sqlite3_free.SQLITE3 ref: 6096CD71
                                                                                              • sqlite3_mutex_leave.SQLITE3 ref: 6096CD80
                                                                                              • sqlite3_errcode.SQLITE3 ref: 6096CD88
                                                                                              • sqlite3_close.SQLITE3 ref: 6096CD97
                                                                                              • sqlite3_create_function.SQLITE3 ref: 6096CDF8
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_free$sqlite3_closesqlite3_create_functionsqlite3_errcodesqlite3_initializesqlite3_logsqlite3_mutex_entersqlite3_mutex_leave
                                                                                              • String ID: BINARY$NOCASE$RTRIM$porter$rtree$rtree_i32$simple
                                                                                              • API String ID: 1320758876-2501389569
                                                                                              • Opcode ID: 6bfcb0ec024900a9d9b4e92c8a495cd7f0e11888819caa106d9e2d842adf35f2
                                                                                              • Instruction ID: 66f98c4e8467cc0752991b2fada45a5d6d89a43a55ba94f1559c09c68fc79e30
                                                                                              • Opcode Fuzzy Hash: 6bfcb0ec024900a9d9b4e92c8a495cd7f0e11888819caa106d9e2d842adf35f2
                                                                                              • Instruction Fuzzy Hash: 7A024BB05183019BEB119F64C49536ABFF6BFA1348F11882DE8959F386D7B9C845CF82
                                                                                              APIs
                                                                                              • sqlite3_free.SQLITE3 ref: 609264C9
                                                                                              • sqlite3_free.SQLITE3 ref: 60926526
                                                                                              • sqlite3_free.SQLITE3 ref: 6092652E
                                                                                              • sqlite3_free.SQLITE3 ref: 60926550
                                                                                                • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                                • Part of subcall function 6090AFF5: sqlite3_free.SQLITE3 ref: 6090B09A
                                                                                              • sqlite3_free.SQLITE3 ref: 60926626
                                                                                              • sqlite3_win32_mbcs_to_utf8.SQLITE3 ref: 6092662E
                                                                                              • sqlite3_free.SQLITE3 ref: 60926638
                                                                                              • sqlite3_snprintf.SQLITE3 ref: 6092666B
                                                                                              • sqlite3_free.SQLITE3 ref: 60926673
                                                                                              • sqlite3_snprintf.SQLITE3 ref: 609266B8
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_free$sqlite3_snprintf$sqlite3_mutex_entersqlite3_win32_mbcs_to_utf8
                                                                                              • String ID: \$winFullPathname1$winFullPathname2$winFullPathname3$winFullPathname4
                                                                                              • API String ID: 937752868-2111127023
                                                                                              • Opcode ID: 76700054f020c8d7fe753577c30eef17e659d67ca67044e42639e839992701d7
                                                                                              • Instruction ID: 28f04709130b2e8b140c84fcd32bad5e17fba194e1ccee1aab8ced89c5ccf9cf
                                                                                              • Opcode Fuzzy Hash: 76700054f020c8d7fe753577c30eef17e659d67ca67044e42639e839992701d7
                                                                                              • Instruction Fuzzy Hash: EA712E706183058FE700AF69D88465DBFF6AFA5748F00C82DE8999B314E778C845DF92
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcmp$sqlite3_mprintf$sqlite3_malloc$sqlite3_freesqlite3_vfs_find
                                                                                              • String ID: @$access$cache
                                                                                              • API String ID: 4158134138-1361544076
                                                                                              • Opcode ID: 19065094f7a61ae5fa0f118773a69bd69932ab9bc71fb499c0e2e31449818374
                                                                                              • Instruction ID: 35071b2ec389daa84eb338d99e29a1052eb2425681bc363379ff67fe3f9a0dd7
                                                                                              • Opcode Fuzzy Hash: 19065094f7a61ae5fa0f118773a69bd69932ab9bc71fb499c0e2e31449818374
                                                                                              • Instruction Fuzzy Hash: 27D19E75D183458BDB11CF69E58039EBBF7AFAA304F20846ED4949B349D339D882CB52
                                                                                              APIs
                                                                                              Strings
                                                                                              • SELECT 'CREATE UNIQUE INDEX vacuum_db.' || substr(sql,21) FROM sqlite_master WHERE sql LIKE 'CREATE UNIQUE INDEX %', xrefs: 60948708
                                                                                              • SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence' , xrefs: 60948748
                                                                                              • INSERT INTO vacuum_db.sqlite_master SELECT type, name, tbl_name, rootpage, sql FROM main.sqlite_master WHERE type='view' OR type='trigger' OR (type='table' AND rootpage=0), xrefs: 60948788
                                                                                              • SELECT 'CREATE TABLE vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE type='table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0, xrefs: 609486C8
                                                                                              • SELECT 'CREATE INDEX vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE sql LIKE 'CREATE INDEX %' , xrefs: 609486E8
                                                                                              • BEGIN;, xrefs: 609485DB
                                                                                              • PRAGMA vacuum_db.synchronous=OFF, xrefs: 609485BB
                                                                                              • SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0, xrefs: 60948728
                                                                                              • SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';, xrefs: 60948768
                                                                                              • ATTACH ':memory:' AS vacuum_db;, xrefs: 60948534
                                                                                              • ATTACH '' AS vacuum_db;, xrefs: 60948529
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_log
                                                                                              • String ID: ATTACH '' AS vacuum_db;$ATTACH ':memory:' AS vacuum_db;$BEGIN;$INSERT INTO vacuum_db.sqlite_master SELECT type, name, tbl_name, rootpage, sql FROM main.sqlite_master WHERE type='view' OR type='trigger' OR (type='table' AND rootpage=0)$PRAGMA vacuum_db.synchronous=OFF$SELECT 'CREATE INDEX vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE sql LIKE 'CREATE INDEX %' $SELECT 'CREATE TABLE vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE type='table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0$SELECT 'CREATE UNIQUE INDEX vacuum_db.' || substr(sql,21) FROM sqlite_master WHERE sql LIKE 'CREATE UNIQUE INDEX %'$SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence' $SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';$SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
                                                                                              • API String ID: 632333372-52344843
                                                                                              • Opcode ID: d52540ff3cd5a889f8fcb2175177c5c293f6bf3e96b3409faf11301466b535e5
                                                                                              • Instruction ID: 17dae18cb22bd420f764556e48f7e631e7f528851c991f2db59136dec61311d4
                                                                                              • Opcode Fuzzy Hash: d52540ff3cd5a889f8fcb2175177c5c293f6bf3e96b3409faf11301466b535e5
                                                                                              • Instruction Fuzzy Hash: 1202F6B0A046299BDB2ACF18C88179EB7FABF65304F1081D9E858AB355D771DE81CF41
                                                                                              APIs
                                                                                              • RegisterServiceCtrlHandlerA.ADVAPI32(DivXConverter), ref: 00401A25
                                                                                              • SetServiceStatus.ADVAPI32(0040BE40), ref: 00401A84
                                                                                              • GetLastError.KERNEL32 ref: 00401A86
                                                                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 00401A93
                                                                                              • GetLastError.KERNEL32 ref: 00401AB4
                                                                                              • SetServiceStatus.ADVAPI32(0040BE40), ref: 00401B2E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: Service$ErrorLastStatus$CreateCtrlEventHandlerRegister
                                                                                              • String ID: DivXConverter$rty
                                                                                              • API String ID: 2905805858-4158391546
                                                                                              • Opcode ID: bd95f50871c230f99d860d5dc631c7b8b946c8529976ee06934ca3de5e8e7fe0
                                                                                              • Instruction ID: 4ddef093d510096679d74c450edf13563879f73cab3912aa9a35456df9c61a72
                                                                                              • Opcode Fuzzy Hash: bd95f50871c230f99d860d5dc631c7b8b946c8529976ee06934ca3de5e8e7fe0
                                                                                              • Instruction Fuzzy Hash: C821D6715012449BC3206F56EF48A96BFB8EB95705B11813AE245B63B1CBF90448DFDD
                                                                                              APIs
                                                                                                • Part of subcall function 609296D1: sqlite3_value_bytes.SQLITE3 ref: 609296F3
                                                                                                • Part of subcall function 609296D1: sqlite3_mprintf.SQLITE3 ref: 60929708
                                                                                                • Part of subcall function 609296D1: sqlite3_free.SQLITE3 ref: 6092971B
                                                                                                • Part of subcall function 6095FFB2: sqlite3_bind_int64.SQLITE3 ref: 6095FFFA
                                                                                                • Part of subcall function 6095FFB2: sqlite3_step.SQLITE3 ref: 60960009
                                                                                                • Part of subcall function 6095FFB2: sqlite3_reset.SQLITE3 ref: 60960019
                                                                                                • Part of subcall function 6095FFB2: sqlite3_result_error_code.SQLITE3 ref: 60960043
                                                                                              • sqlite3_malloc.SQLITE3 ref: 60960384
                                                                                              • sqlite3_free.SQLITE3 ref: 609605EA
                                                                                              • sqlite3_result_error_code.SQLITE3 ref: 6096060D
                                                                                              • sqlite3_free.SQLITE3 ref: 60960618
                                                                                              • sqlite3_result_text.SQLITE3 ref: 6096063C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_free$sqlite3_result_error_code$sqlite3_bind_int64sqlite3_mallocsqlite3_mprintfsqlite3_resetsqlite3_result_textsqlite3_stepsqlite3_value_bytes
                                                                                              • String ID: offsets
                                                                                              • API String ID: 463808202-2642679573
                                                                                              • Opcode ID: 496dcd0dbd0e24e84f3ae9a4f9495b5d667a7098f4014ef95464c797b1727b83
                                                                                              • Instruction ID: 1101d6838161b799219a4b3d5732631e197d31251dd2d8b91c34f261bd2faa79
                                                                                              • Opcode Fuzzy Hash: 496dcd0dbd0e24e84f3ae9a4f9495b5d667a7098f4014ef95464c797b1727b83
                                                                                              • Instruction Fuzzy Hash: 72C1D374A183198FDB14CF59C580B8EBBF2BFA8314F2085A9E849AB354D734D985CF52
                                                                                              APIs
                                                                                              • sqlite3_value_text.SQLITE3 ref: 6091A3C1
                                                                                              • sqlite3_value_bytes.SQLITE3 ref: 6091A3D6
                                                                                              • sqlite3_value_text.SQLITE3 ref: 6091A3E4
                                                                                              • sqlite3_value_bytes.SQLITE3 ref: 6091A416
                                                                                              • sqlite3_value_text.SQLITE3 ref: 6091A424
                                                                                              • sqlite3_value_bytes.SQLITE3 ref: 6091A43A
                                                                                              • sqlite3_result_text.SQLITE3 ref: 6091A5A2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_value_bytessqlite3_value_text$sqlite3_result_text
                                                                                              • String ID:
                                                                                              • API String ID: 2903785150-0
                                                                                              • Opcode ID: 408a6008a3f19a662094ad197d730d6af4ceeedc2d56196c0f88669f9a2ea12f
                                                                                              • Instruction ID: 050d84d3da0bd462ad4a4a15df4a38950001fc66f1de33c81d7c2c3a6f7146e7
                                                                                              • Opcode Fuzzy Hash: 408a6008a3f19a662094ad197d730d6af4ceeedc2d56196c0f88669f9a2ea12f
                                                                                              • Instruction Fuzzy Hash: 8971D074E086599FCF00DFA8C88069DBBF2BF59314F1485AAE855AB304E734EC85CB91
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_freesqlite3_malloc
                                                                                              • String ID:
                                                                                              • API String ID: 423083942-0
                                                                                              • Opcode ID: 039a1925b88827ab71129b12bf0a0cfd7bb9a75e2f5fb5313a60c0869b9e4a18
                                                                                              • Instruction ID: dba10035f3c017a022ff92dc0406edc4c972eb6647695f7afdbed5011b3e14eb
                                                                                              • Opcode Fuzzy Hash: 039a1925b88827ab71129b12bf0a0cfd7bb9a75e2f5fb5313a60c0869b9e4a18
                                                                                              • Instruction Fuzzy Hash: 9112E3B4A15218CFCB18CF98D480A9EBBF6BF98304F24855AD855AB319D774EC42CF90
                                                                                              APIs
                                                                                              • sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 609124D1
                                                                                              • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 6091264D
                                                                                              • sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 60912662
                                                                                              • sqlite3_malloc.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 6091273E
                                                                                              • sqlite3_free.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 60912753
                                                                                              • sqlite3_os_init.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 60912758
                                                                                              • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 60912803
                                                                                              • sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 6091280E
                                                                                              • sqlite3_mutex_free.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 6091282A
                                                                                              • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 6091283F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_mutex_entersqlite3_mutex_leave$sqlite3_freesqlite3_mallocsqlite3_mutex_freesqlite3_os_init
                                                                                              • String ID:
                                                                                              • API String ID: 3556715608-0
                                                                                              • Opcode ID: 7a5b012c4fe40a1866ea25e0c9ef8651b072e840c3be51a8f23ca71a75eb633f
                                                                                              • Instruction ID: 37d7613b282c24208f37f95ee69ae3eaf9c0527d79975c213f2f38643f7f707f
                                                                                              • Opcode Fuzzy Hash: 7a5b012c4fe40a1866ea25e0c9ef8651b072e840c3be51a8f23ca71a75eb633f
                                                                                              • Instruction Fuzzy Hash: FEA14A71A2C215CBEB009F69CC843257FE7B7A7318F10816DD415AB2A0E7B9DC95EB11
                                                                                              APIs
                                                                                              • sqlite3_malloc.SQLITE3 ref: 6095F645
                                                                                              • sqlite3_exec.SQLITE3 ref: 6095F686
                                                                                                • Part of subcall function 6094CBB8: sqlite3_log.SQLITE3 ref: 6094CBF8
                                                                                              • sqlite3_free_table.SQLITE3 ref: 6095F6A0
                                                                                              • sqlite3_mprintf.SQLITE3 ref: 6095F6C7
                                                                                                • Part of subcall function 609296AA: sqlite3_initialize.SQLITE3 ref: 609296B0
                                                                                                • Part of subcall function 609296AA: sqlite3_vmprintf.SQLITE3 ref: 609296CA
                                                                                              • sqlite3_free.SQLITE3 ref: 6095F6B4
                                                                                                • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                              • sqlite3_free.SQLITE3 ref: 6095F6D4
                                                                                              • sqlite3_free.SQLITE3 ref: 6095F6ED
                                                                                              • sqlite3_free_table.SQLITE3 ref: 6095F6FF
                                                                                              • sqlite3_realloc.SQLITE3 ref: 6095F71B
                                                                                              • sqlite3_free_table.SQLITE3 ref: 6095F72D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_freesqlite3_free_table$sqlite3_execsqlite3_initializesqlite3_logsqlite3_mallocsqlite3_mprintfsqlite3_mutex_entersqlite3_reallocsqlite3_vmprintf
                                                                                              • String ID:
                                                                                              • API String ID: 1866449048-0
                                                                                              • Opcode ID: 2addae8d4502475aa330d0fbe12d9077f3fed0f055932ab6dac269a256a03500
                                                                                              • Instruction ID: 9ac78cbffd0e0cf27e5d0fdbf17c3a3d034f00011a14f89e76d08e502163788c
                                                                                              • Opcode Fuzzy Hash: 2addae8d4502475aa330d0fbe12d9077f3fed0f055932ab6dac269a256a03500
                                                                                              • Instruction Fuzzy Hash: 8751F1B49467099FDB01DF69D59178EBBF6FF68318F104429E884AB300D379D894CB91
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,00403EF1,?,Microsoft Visual C++ Runtime Library,00012010,?,00408574,?,004085C4,?,?,?,Runtime Error!Program: ), ref: 004060FA
                                                                                              • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 00406112
                                                                                              • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 00406123
                                                                                              • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 00406130
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$LibraryLoad
                                                                                              • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                                                                              • API String ID: 2238633743-4044615076
                                                                                              • Opcode ID: 30dd77c3664451088d9a49f7b1ebdf2ed2115b5f614d26e279abac0bd39ca4ff
                                                                                              • Instruction ID: 36fb3fed3a384cff097ea3fb9e63704b9da04faa094e7ece228342700e77c082
                                                                                              • Opcode Fuzzy Hash: 30dd77c3664451088d9a49f7b1ebdf2ed2115b5f614d26e279abac0bd39ca4ff
                                                                                              • Instruction Fuzzy Hash: E5018431700211DBC7109FB59FC0A177BE99A997C0712093FB646FA2A3DA7C88158FAD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: $ AND $%s USING %sINDEX %s%s$%s USING AUTOMATIC %sINDEX%.0s%s$)><$0$ANY($COVERING $SCAN$SEARCH$rowid
                                                                                              • API String ID: 0-780898
                                                                                              • Opcode ID: d1d17e5dd7c74eae3224551f6f3ab351f201226dcaab78a09df61ec6b72ac00d
                                                                                              • Instruction ID: 1b008e11d07f16b9462ef115b46fd1892196ed4c5360d6a6f9a636b6bab85f9b
                                                                                              • Opcode Fuzzy Hash: d1d17e5dd7c74eae3224551f6f3ab351f201226dcaab78a09df61ec6b72ac00d
                                                                                              • Instruction Fuzzy Hash: 46D109B0A087099FD714CF99C19079DBBF2BFA8308F10886AE495AB355D774D982CF81
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: aolf$aolf$bolb$bolc$buod$buod$laer$laer$rahc$tni$txet
                                                                                              • API String ID: 0-2604012851
                                                                                              • Opcode ID: b472df4709d2161ac4da3e6dd873a69b8789eadb7617e1432b7f17fad04b9ea6
                                                                                              • Instruction ID: a78f5df49eecf700eafad7d6eadd6707640e608d2d263d021760269e78388884
                                                                                              • Opcode Fuzzy Hash: b472df4709d2161ac4da3e6dd873a69b8789eadb7617e1432b7f17fad04b9ea6
                                                                                              • Instruction Fuzzy Hash: 2D31B171A891458ADB21891C85503EE7FBB9BE3344F28902EC8B2DB246C735CCD0C3A2
                                                                                              APIs
                                                                                              • LCMapStringW.KERNEL32(00000000,00000100,00408640,00000001,00000000,00000000,00000103,00000001,00000000,?,00405E87,00200020,00000000,?,00000000,00000000), ref: 00406409
                                                                                              • LCMapStringA.KERNEL32(00000000,00000100,0040863C,00000001,00000000,00000000,?,00405E87,00200020,00000000,?,00000000,00000000,00000001), ref: 00406425
                                                                                              • LCMapStringA.KERNEL32(00000000,?,00000000,00200020,00405E87,?,00000103,00000001,00000000,?,00405E87,00200020,00000000,?,00000000,00000000), ref: 0040646E
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,00200020,00000000,00000000,00000103,00000001,00000000,?,00405E87,00200020,00000000,?,00000000,00000000), ref: 004064A6
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,00405E87,00200020,00000000,?,00000000), ref: 004064FE
                                                                                              • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,00405E87,00200020,00000000,?,00000000), ref: 00406514
                                                                                              • LCMapStringW.KERNEL32(00000000,?,00405E87,00000000,00405E87,?,?,00405E87,00200020,00000000,?,00000000), ref: 00406547
                                                                                              • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,00405E87,00200020,00000000,?,00000000), ref: 004065AF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: String$ByteCharMultiWide
                                                                                              • String ID:
                                                                                              • API String ID: 352835431-0
                                                                                              • Opcode ID: 9c7cee020c542fb800dbf7d144ed3697215e486a5166d3a559f4f8a108ac6f85
                                                                                              • Instruction ID: d42c4ff00bdcea80f115aa50461d5d245c16a81543514470c81a73783c2cd3a2
                                                                                              • Opcode Fuzzy Hash: 9c7cee020c542fb800dbf7d144ed3697215e486a5166d3a559f4f8a108ac6f85
                                                                                              • Instruction Fuzzy Hash: 4A517B71900209FFCF229F58DD49A9F7BB9FB48750F11413AF912B12A0D7398961DBA8
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcmp$sqlite3_logsqlite3_mutex_try
                                                                                              • String ID: 0$SQLite format 3
                                                                                              • API String ID: 3174206576-3388949527
                                                                                              • Opcode ID: e2a376b1a29b79c4f9f51ec04e7584e9c4e5062bfe0a82991cc629df80cc0a0f
                                                                                              • Instruction ID: d3cc03899c2fb96d27ccc41cf7ad58ff30b38a29db2c3208110d6cb2c70dce50
                                                                                              • Opcode Fuzzy Hash: e2a376b1a29b79c4f9f51ec04e7584e9c4e5062bfe0a82991cc629df80cc0a0f
                                                                                              • Instruction Fuzzy Hash: A3028BB0A082659BDB09CF68D48178ABBF7FFA5308F148269E8459B345DB74DC85CF81
                                                                                              APIs
                                                                                              • sqlite3_value_text.SQLITE3 ref: 6095F030
                                                                                              • sqlite3_value_text.SQLITE3 ref: 6095F03E
                                                                                              • sqlite3_stricmp.SQLITE3 ref: 6095F0B3
                                                                                              • sqlite3_free.SQLITE3 ref: 6095F180
                                                                                                • Part of subcall function 6092E279: strcmp.MSVCRT ref: 6092E2AE
                                                                                                • Part of subcall function 6092E279: sqlite3_free.SQLITE3 ref: 6092E3A8
                                                                                              • sqlite3_free.SQLITE3 ref: 6095F1BD
                                                                                                • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                              • sqlite3_result_error_code.SQLITE3 ref: 6095F34E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_free$sqlite3_value_text$sqlite3_mutex_entersqlite3_result_error_codesqlite3_stricmpstrcmp
                                                                                              • String ID: |
                                                                                              • API String ID: 1576672187-2343686810
                                                                                              • Opcode ID: 45796efa6547682f16092b9fa288c01422e20de86ab54653b6df12e990b05c38
                                                                                              • Instruction ID: c4017fd8acd983bc841f22cdb0f4132ffe50c361176833da1127552c957ad2bb
                                                                                              • Opcode Fuzzy Hash: 45796efa6547682f16092b9fa288c01422e20de86ab54653b6df12e990b05c38
                                                                                              • Instruction Fuzzy Hash: B2B189B4A08308CBDB01CF69C491B9EBBF2BF68358F148968E854AB355D734EC55CB81
                                                                                              APIs
                                                                                              • sqlite3_snprintf.SQLITE3 ref: 6095D450
                                                                                                • Part of subcall function 60917354: sqlite3_vsnprintf.SQLITE3 ref: 60917375
                                                                                              • sqlite3_snprintf.SQLITE3 ref: 6095D4A1
                                                                                              • sqlite3_snprintf.SQLITE3 ref: 6095D525
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_snprintf$sqlite3_vsnprintf
                                                                                              • String ID: $)><$sqlite_master$sqlite_temp_master
                                                                                              • API String ID: 652164897-1572359634
                                                                                              • Opcode ID: 7664a015b2dc01db37cf12657f922778db359f6c70a1ba93bfebbfbe3581116b
                                                                                              • Instruction ID: a98725bc65f6cff0ffebef66634980575a39ba2d787d432de3c608a01e11e389
                                                                                              • Opcode Fuzzy Hash: 7664a015b2dc01db37cf12657f922778db359f6c70a1ba93bfebbfbe3581116b
                                                                                              • Instruction Fuzzy Hash: 5991F275E05219CFCB15CF98C48169DBBF2BFA9308F14845AE859AB314DB34ED46CB81
                                                                                              APIs
                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 00403E3A
                                                                                              • GetStdHandle.KERNEL32(000000F4,00408574,00000000,?,00000000,00000000), ref: 00403F10
                                                                                              • WriteFile.KERNEL32(00000000), ref: 00403F17
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$HandleModuleNameWrite
                                                                                              • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                                                              • API String ID: 3784150691-4022980321
                                                                                              • Opcode ID: 04cfe4ace2dd9675a620efbbcb8461293764693c9a36d9750f915388fa73d055
                                                                                              • Instruction ID: 1325ef8c40c3fac29ee6baa2b36e74f90486e8040fe1898f7fb10d69898ee010
                                                                                              • Opcode Fuzzy Hash: 04cfe4ace2dd9675a620efbbcb8461293764693c9a36d9750f915388fa73d055
                                                                                              • Instruction Fuzzy Hash: 3331C172A002186FDF24EA60DE4AFEA776CAB45304F10057FF584F61D1DAB8AE448A5D
                                                                                              APIs
                                                                                              • sqlite3_value_text.SQLITE3 ref: 6091B06E
                                                                                              • sqlite3_result_error_toobig.SQLITE3 ref: 6091B178
                                                                                              • sqlite3_result_error_nomem.SQLITE3 ref: 6091B197
                                                                                              • sqlite3_result_text.SQLITE3 ref: 6091B5A3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_result_error_nomemsqlite3_result_error_toobigsqlite3_result_textsqlite3_value_text
                                                                                              • String ID:
                                                                                              • API String ID: 2352520524-0
                                                                                              • Opcode ID: bf61c68f4ce88464188c3b4ec21cbec410585f797eaf5b0aff599f1fc01aebfc
                                                                                              • Instruction ID: 99f21b63ad5c9672efebb0dd762c853f70c7e366ddc85f9db9da2d733c13ec0c
                                                                                              • Opcode Fuzzy Hash: bf61c68f4ce88464188c3b4ec21cbec410585f797eaf5b0aff599f1fc01aebfc
                                                                                              • Instruction Fuzzy Hash: F9E16B71E4C2199BDB208F18C89039EBBF7AB65314F1584DAE8A857351D738DCC19F82
                                                                                              APIs
                                                                                                • Part of subcall function 609296D1: sqlite3_value_bytes.SQLITE3 ref: 609296F3
                                                                                                • Part of subcall function 609296D1: sqlite3_mprintf.SQLITE3 ref: 60929708
                                                                                                • Part of subcall function 609296D1: sqlite3_free.SQLITE3 ref: 6092971B
                                                                                              • sqlite3_exec.SQLITE3 ref: 6096A4D7
                                                                                                • Part of subcall function 6094CBB8: sqlite3_log.SQLITE3 ref: 6094CBF8
                                                                                              • sqlite3_result_text.SQLITE3 ref: 6096A5D3
                                                                                                • Part of subcall function 6096A38C: sqlite3_bind_int.SQLITE3 ref: 6096A3DE
                                                                                                • Part of subcall function 6096A38C: sqlite3_step.SQLITE3 ref: 6096A435
                                                                                                • Part of subcall function 6096A38C: sqlite3_reset.SQLITE3 ref: 6096A445
                                                                                              • sqlite3_exec.SQLITE3 ref: 6096A523
                                                                                              • sqlite3_exec.SQLITE3 ref: 6096A554
                                                                                              • sqlite3_exec.SQLITE3 ref: 6096A57F
                                                                                              • sqlite3_result_error_code.SQLITE3 ref: 6096A5E1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_exec$sqlite3_bind_intsqlite3_freesqlite3_logsqlite3_mprintfsqlite3_resetsqlite3_result_error_codesqlite3_result_textsqlite3_stepsqlite3_value_bytes
                                                                                              • String ID: optimize
                                                                                              • API String ID: 3659050757-3797040228
                                                                                              • Opcode ID: c770602c58b8b739d860714e2a7cbb539b0686760bc80d510edb2603001de118
                                                                                              • Instruction ID: 653702cfcd2f061f0588c77de086fc27204f9fc351fc8b4992cba684a546c14d
                                                                                              • Opcode Fuzzy Hash: c770602c58b8b739d860714e2a7cbb539b0686760bc80d510edb2603001de118
                                                                                              • Instruction Fuzzy Hash: E831C3B11187119FE310DF24C49570FBBE6ABA1368F10C91DF9968B350E7B9D8459F82
                                                                                              APIs
                                                                                              • sqlite3_column_blob.SQLITE3 ref: 609654FB
                                                                                              • sqlite3_column_bytes.SQLITE3 ref: 60965510
                                                                                              • sqlite3_reset.SQLITE3 ref: 60965556
                                                                                              • sqlite3_reset.SQLITE3 ref: 609655B8
                                                                                                • Part of subcall function 60941C40: sqlite3_mutex_enter.SQLITE3 ref: 60941C58
                                                                                                • Part of subcall function 60941C40: sqlite3_mutex_leave.SQLITE3 ref: 60941CBE
                                                                                              • sqlite3_malloc.SQLITE3 ref: 60965655
                                                                                              • sqlite3_free.SQLITE3 ref: 60965714
                                                                                              • sqlite3_free.SQLITE3 ref: 6096574B
                                                                                                • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                              • sqlite3_free.SQLITE3 ref: 609657AA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_free$sqlite3_mutex_entersqlite3_reset$sqlite3_column_blobsqlite3_column_bytessqlite3_mallocsqlite3_mutex_leave
                                                                                              • String ID:
                                                                                              • API String ID: 2722129401-0
                                                                                              • Opcode ID: 718344d9776843f9d3d0f11354c3fb96bdbf3732bae6ebd8df48c35682458f02
                                                                                              • Instruction ID: e3a8cc565ee031670952cbbbf81914cbe75110044a29491daaf6513bdc913a85
                                                                                              • Opcode Fuzzy Hash: 718344d9776843f9d3d0f11354c3fb96bdbf3732bae6ebd8df48c35682458f02
                                                                                              • Instruction Fuzzy Hash: BBD1D270E14219CFEB14CFA9C48469DBBF2BF68304F20856AD899AB346D774E845CF81
                                                                                              APIs
                                                                                              • RegisterServiceCtrlHandlerA.ADVAPI32(DivXConverter), ref: 00401A25
                                                                                              • SetServiceStatus.ADVAPI32(0040BE40), ref: 00401A84
                                                                                              • GetLastError.KERNEL32 ref: 00401A86
                                                                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 00401A93
                                                                                              • GetLastError.KERNEL32 ref: 00401AB4
                                                                                              • SetServiceStatus.ADVAPI32(0040BE40), ref: 00401AE4
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00001897,00000000,00000000,00000000), ref: 00401AF0
                                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00401AF9
                                                                                              • CloseHandle.KERNEL32 ref: 00401B05
                                                                                              • SetServiceStatus.ADVAPI32(0040BE40), ref: 00401B2E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: Service$Status$CreateErrorLast$CloseCtrlEventHandleHandlerObjectRegisterSingleThreadWait
                                                                                              • String ID: DivXConverter
                                                                                              • API String ID: 3346042915-4132716239
                                                                                              • Opcode ID: 81e72e9cd7c3dd36b0a9fb146f42514e3fca6a6d23a37b1ad8a12f1c70bbfc14
                                                                                              • Instruction ID: 5f64710fbe5d0f731c09564eeb1326b966fb783e506918a3b11da2c5fba9033b
                                                                                              • Opcode Fuzzy Hash: 81e72e9cd7c3dd36b0a9fb146f42514e3fca6a6d23a37b1ad8a12f1c70bbfc14
                                                                                              • Instruction Fuzzy Hash: 60110971541244ABC3206F16EF48E96BFB9EB95B45B15403BE241B23B1CBF90444CBEC
                                                                                              APIs
                                                                                              • sqlite3_malloc.SQLITE3 ref: 609645D9
                                                                                                • Part of subcall function 60928099: sqlite3_malloc.SQLITE3 ref: 609280ED
                                                                                              • sqlite3_free.SQLITE3 ref: 609647C5
                                                                                                • Part of subcall function 60963D35: memcmp.MSVCRT ref: 60963E74
                                                                                              • sqlite3_free.SQLITE3 ref: 6096476B
                                                                                                • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                              • sqlite3_free.SQLITE3 ref: 6096477B
                                                                                              • sqlite3_free.SQLITE3 ref: 60964783
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_free$sqlite3_malloc$memcmpsqlite3_mutex_enter
                                                                                              • String ID:
                                                                                              • API String ID: 571598680-0
                                                                                              • Opcode ID: d604abe0313f10411a0f234c71df8e29ee85eaf68e2bcebad1bf05c151ae1b53
                                                                                              • Instruction ID: 53ad94a03898eae12f4127695087571842428d6fdffc19c65fee49adcf86f1ae
                                                                                              • Opcode Fuzzy Hash: d604abe0313f10411a0f234c71df8e29ee85eaf68e2bcebad1bf05c151ae1b53
                                                                                              • Instruction Fuzzy Hash: 5E91F674E14228CFEB14CFA9D890B9EBBB6BB99304F1085AAD849A7344D734DD81CF51
                                                                                              APIs
                                                                                              • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402AA4), ref: 0040372D
                                                                                              • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402AA4), ref: 00403741
                                                                                              • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402AA4), ref: 0040376D
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402AA4), ref: 004037A5
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402AA4), ref: 004037C7
                                                                                              • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,00402AA4), ref: 004037E0
                                                                                              • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402AA4), ref: 004037F3
                                                                                              • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00403831
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                                                              • String ID:
                                                                                              • API String ID: 1823725401-0
                                                                                              • Opcode ID: 7f1ee2c931afbeb2bcd72820eb8f065979dd47f7a99393091ec5d7620f58e433
                                                                                              • Instruction ID: 45b108152198534a65e95edcfca0b8ba0a54c8eec5aa0c4c05c1d64ec2385aa0
                                                                                              • Opcode Fuzzy Hash: 7f1ee2c931afbeb2bcd72820eb8f065979dd47f7a99393091ec5d7620f58e433
                                                                                              • Instruction Fuzzy Hash: 2131D2F35082619ED7203F745DC483BBE9CEA4530A715453FF981F3280DA795D4286A9
                                                                                              APIs
                                                                                              • sqlite3_blob_reopen.SQLITE3 ref: 60963510
                                                                                                • Part of subcall function 60962F28: sqlite3_log.SQLITE3 ref: 60962F5D
                                                                                              • sqlite3_mprintf.SQLITE3 ref: 60963534
                                                                                              • sqlite3_blob_open.SQLITE3 ref: 6096358B
                                                                                              • sqlite3_blob_bytes.SQLITE3 ref: 609635A3
                                                                                              • sqlite3_malloc.SQLITE3 ref: 609635BB
                                                                                              • sqlite3_blob_read.SQLITE3 ref: 60963602
                                                                                              • sqlite3_free.SQLITE3 ref: 60963621
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_blob_bytessqlite3_blob_opensqlite3_blob_readsqlite3_blob_reopensqlite3_freesqlite3_logsqlite3_mallocsqlite3_mprintf
                                                                                              • String ID:
                                                                                              • API String ID: 4276469440-0
                                                                                              • Opcode ID: 81f80890dbec9a3991ff68d8cfcbb164f6b4d7f09a97d6cb6c54cb11191f3d09
                                                                                              • Instruction ID: 177081cd506585250240414a33056f89eeda992db91a315aff795e5fc91eaf1e
                                                                                              • Opcode Fuzzy Hash: 81f80890dbec9a3991ff68d8cfcbb164f6b4d7f09a97d6cb6c54cb11191f3d09
                                                                                              • Instruction Fuzzy Hash: C641E5B09087059FDB40DF29C48179EBBE6AF98354F01C87AE898DB354E734D841DB92
                                                                                              APIs
                                                                                              • sqlite3_value_text.SQLITE3 ref: 6091A240
                                                                                              • sqlite3_value_text.SQLITE3 ref: 6091A24E
                                                                                              • sqlite3_value_bytes.SQLITE3 ref: 6091A25A
                                                                                              • sqlite3_value_text.SQLITE3 ref: 6091A27C
                                                                                              Strings
                                                                                              • LIKE or GLOB pattern too complex, xrefs: 6091A267
                                                                                              • ESCAPE expression must be a single character, xrefs: 6091A293
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_value_text$sqlite3_value_bytes
                                                                                              • String ID: ESCAPE expression must be a single character$LIKE or GLOB pattern too complex
                                                                                              • API String ID: 4080917175-264706735
                                                                                              • Opcode ID: e5bda90e0e0ba1860c41bc069fb20e3a267b2c9271c0a370806f06164fd47fa4
                                                                                              • Instruction ID: 7e7232241edcba55bc41816b79a09feadaac9d75cc2fb544db44a2248cbef301
                                                                                              • Opcode Fuzzy Hash: e5bda90e0e0ba1860c41bc069fb20e3a267b2c9271c0a370806f06164fd47fa4
                                                                                              • Instruction Fuzzy Hash: A4214C74A182198BCB00DF79C88165EBBF6FF64354B108AA9E864DB344E734DCC6CB95
                                                                                              APIs
                                                                                                • Part of subcall function 6092506E: sqlite3_log.SQLITE3 ref: 609250AB
                                                                                              • sqlite3_mutex_enter.SQLITE3 ref: 609250E7
                                                                                              • sqlite3_value_text16.SQLITE3 ref: 60925100
                                                                                              • sqlite3_value_text16.SQLITE3 ref: 6092512C
                                                                                              • sqlite3_mutex_leave.SQLITE3 ref: 6092513E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_value_text16$sqlite3_logsqlite3_mutex_entersqlite3_mutex_leave
                                                                                              • String ID: library routine called out of sequence$out of memory
                                                                                              • API String ID: 2019783549-3029887290
                                                                                              • Opcode ID: bf8b25fefa583efc99e02b0fe9019e927645d1a19242a42ec125398c6bed8d9e
                                                                                              • Instruction ID: f6310061860eb79c45c0a7b6efb00bde58ba827c5a391e7df96a4cb3fbc4cfa9
                                                                                              • Opcode Fuzzy Hash: bf8b25fefa583efc99e02b0fe9019e927645d1a19242a42ec125398c6bed8d9e
                                                                                              • Instruction Fuzzy Hash: 81014C70A083049BDB14AF69C9C170EBBE6BF64248F0488A9EC958F30EE775D8818B51
                                                                                              APIs
                                                                                              • GetStringTypeW.KERNEL32(00000001,00408640,00000001,00000000,00000103,00000001,00000000,00405E87,00200020,00000000,?,00000000,00000000,00000001), ref: 004062BD
                                                                                              • GetStringTypeA.KERNEL32(00000000,00000001,0040863C,00000001,?,?,00000000,00000000,00000001), ref: 004062D7
                                                                                              • GetStringTypeA.KERNEL32(00000000,00000000,?,00000000,00200020,00000103,00000001,00000000,00405E87,00200020,00000000,?,00000000,00000000,00000001), ref: 0040630B
                                                                                              • MultiByteToWideChar.KERNEL32(00405E87,00000002,?,00000000,00000000,00000000,00000103,00000001,00000000,00405E87,00200020,00000000,?,00000000,00000000,00000001), ref: 00406343
                                                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00406399
                                                                                              • GetStringTypeW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004063AB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: StringType$ByteCharMultiWide
                                                                                              • String ID:
                                                                                              • API String ID: 3852931651-0
                                                                                              • Opcode ID: d203232162232c56530dc1c9e7ac7d7ca2f1092592616d16a6b156e600e46040
                                                                                              • Instruction ID: 1973b5c1488275f86b32e201772009c48c68fd6130b56f6c31499d13724d529d
                                                                                              • Opcode Fuzzy Hash: d203232162232c56530dc1c9e7ac7d7ca2f1092592616d16a6b156e600e46040
                                                                                              • Instruction Fuzzy Hash: 97418E72500219EFDF119F94DE86AAF3F78EB04350F11453AFA52F6290C73989608BE8
                                                                                              APIs
                                                                                              • sqlite3_free.SQLITE3(?), ref: 609476DD
                                                                                                • Part of subcall function 60904423: sqlite3_mutex_leave.SQLITE3(6090449D,?,?,?,60908270), ref: 60904446
                                                                                              • sqlite3_log.SQLITE3 ref: 609498F5
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_freesqlite3_logsqlite3_mutex_leave
                                                                                              • String ID: List of tree roots: $d$|
                                                                                              • API String ID: 3709608969-1164703836
                                                                                              • Opcode ID: 316fa83f4dc1e403b3b617744d66ff6f9af545e53e2752a9ff9486d467efffaf
                                                                                              • Instruction ID: c91562837ba2d96ae21b52ab8334c840e7cbe23d8154f1acff92b465618a0bd4
                                                                                              • Opcode Fuzzy Hash: 316fa83f4dc1e403b3b617744d66ff6f9af545e53e2752a9ff9486d467efffaf
                                                                                              • Instruction Fuzzy Hash: 3FE10570A043698BDB22CF18C88179DFBBABF65304F1185D9E858AB251D775DE81CF81
                                                                                              APIs
                                                                                                • Part of subcall function 6095FFB2: sqlite3_bind_int64.SQLITE3 ref: 6095FFFA
                                                                                                • Part of subcall function 6095FFB2: sqlite3_step.SQLITE3 ref: 60960009
                                                                                                • Part of subcall function 6095FFB2: sqlite3_reset.SQLITE3 ref: 60960019
                                                                                                • Part of subcall function 6095FFB2: sqlite3_result_error_code.SQLITE3 ref: 60960043
                                                                                              • sqlite3_column_int64.SQLITE3 ref: 609600BA
                                                                                              • sqlite3_column_text.SQLITE3 ref: 609600EF
                                                                                              • sqlite3_free.SQLITE3 ref: 6096029A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_bind_int64sqlite3_column_int64sqlite3_column_textsqlite3_freesqlite3_resetsqlite3_result_error_codesqlite3_step
                                                                                              • String ID: e
                                                                                              • API String ID: 786425071-4024072794
                                                                                              • Opcode ID: 373422d03c3c71c2ddc35291c61dfb2213fd8f263c0b9a30c36f02d650250dc2
                                                                                              • Instruction ID: e80500568aa73e744b5c90812a7938b6c4ac38b40afb48beb036dafaf3e7d002
                                                                                              • Opcode Fuzzy Hash: 373422d03c3c71c2ddc35291c61dfb2213fd8f263c0b9a30c36f02d650250dc2
                                                                                              • Instruction Fuzzy Hash: 6291E270A18609CFDB04CF99C494B9EBBF2BF98314F108529E869AB354D774E885CF91
                                                                                              APIs
                                                                                              • GetVersionExA.KERNEL32 ref: 00403A3B
                                                                                              • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 00403A70
                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00403AD0
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: EnvironmentFileModuleNameVariableVersion
                                                                                              • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                                                              • API String ID: 1385375860-4131005785
                                                                                              • Opcode ID: 0f37da7df256ea2bf10cd5595ffbc211f3aae08b662fce8f1d53329a7b1a0cb3
                                                                                              • Instruction ID: 8e0d8efe135bd9bd4ab90b631ae35de0fa5087430b450c3f58eab12f6465c816
                                                                                              • Opcode Fuzzy Hash: 0f37da7df256ea2bf10cd5595ffbc211f3aae08b662fce8f1d53329a7b1a0cb3
                                                                                              • Instruction Fuzzy Hash: BD3102319012886DEB319A745C46B9B7F6C9B02309F2404FBE185F52C3E6389F89CB1D
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_exec
                                                                                              • String ID: sqlite_master$sqlite_temp_master$|
                                                                                              • API String ID: 2141490097-2247242311
                                                                                              • Opcode ID: 0e32379bf9c90bcee3e658b343db186d73978ee403121efd96d42beb4ff38922
                                                                                              • Instruction ID: 9143400cfb6dc20a8edc2ca7c04099347fc9d468871a1d2187ae3123f936d49a
                                                                                              • Opcode Fuzzy Hash: 0e32379bf9c90bcee3e658b343db186d73978ee403121efd96d42beb4ff38922
                                                                                              • Instruction Fuzzy Hash: C551B6B09083289BDB26CF18C885799BBFABF59304F108599E498A7351D775DA84CF41
                                                                                              APIs
                                                                                                • Part of subcall function 6090A0D5: sqlite3_free.SQLITE3 ref: 6090A118
                                                                                              • sqlite3_malloc.SQLITE3 ref: 6094B1D1
                                                                                              • sqlite3_value_bytes.SQLITE3 ref: 6094B24C
                                                                                              • sqlite3_malloc.SQLITE3 ref: 6094B272
                                                                                              • sqlite3_value_blob.SQLITE3 ref: 6094B298
                                                                                              • sqlite3_free.SQLITE3 ref: 6094B2C8
                                                                                                • Part of subcall function 6094A894: sqlite3_bind_int64.SQLITE3 ref: 6094A8C0
                                                                                                • Part of subcall function 6094A894: sqlite3_step.SQLITE3 ref: 6094A8CE
                                                                                                • Part of subcall function 6094A894: sqlite3_column_int64.SQLITE3 ref: 6094A8E9
                                                                                                • Part of subcall function 6094A894: sqlite3_reset.SQLITE3 ref: 6094A90F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_freesqlite3_malloc$sqlite3_bind_int64sqlite3_column_int64sqlite3_resetsqlite3_stepsqlite3_value_blobsqlite3_value_bytes
                                                                                              • String ID:
                                                                                              • API String ID: 683514883-0
                                                                                              • Opcode ID: 3036fcfce1ee653ed62d56f61367963e4d2afc4bfe1ca560103df060be3b8356
                                                                                              • Instruction ID: 83940ce9cf0a2bab7a741171fc95cc3a005d2848f59039768723a80715f2adcb
                                                                                              • Opcode Fuzzy Hash: 3036fcfce1ee653ed62d56f61367963e4d2afc4bfe1ca560103df060be3b8356
                                                                                              • Instruction Fuzzy Hash: E19133B1A052099FCB04CFA9D490B9EBBF6FF68314F108569E855AB341DB34ED81CB91
                                                                                              APIs
                                                                                              • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,6093A8DF), ref: 6093A200
                                                                                              • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,6093A8DF), ref: 6093A391
                                                                                              • sqlite3_mutex_free.SQLITE3(?,?,?,?,?,?,?,?,6093A8DF), ref: 6093A3A3
                                                                                              • sqlite3_free.SQLITE3 ref: 6093A3BA
                                                                                              • sqlite3_free.SQLITE3 ref: 6093A3C2
                                                                                                • Part of subcall function 6093A0C5: sqlite3_mutex_enter.SQLITE3 ref: 6093A114
                                                                                                • Part of subcall function 6093A0C5: sqlite3_mutex_free.SQLITE3 ref: 6093A152
                                                                                                • Part of subcall function 6093A0C5: sqlite3_mutex_leave.SQLITE3 ref: 6093A162
                                                                                                • Part of subcall function 6093A0C5: sqlite3_free.SQLITE3 ref: 6093A1A4
                                                                                                • Part of subcall function 6093A0C5: sqlite3_free.SQLITE3 ref: 6093A1C3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_free$sqlite3_mutex_leave$sqlite3_mutex_free$sqlite3_mutex_enter
                                                                                              • String ID:
                                                                                              • API String ID: 1903298374-0
                                                                                              • Opcode ID: 8530df85f137a660efabd51ca86f4821d2fdcc6d7a3fd2cfb4f5547b241dda56
                                                                                              • Instruction ID: f6c450fbbadf2e04ab128defb7df19fdb2a161b4e6cf4e71623f80625393026f
                                                                                              • Opcode Fuzzy Hash: 8530df85f137a660efabd51ca86f4821d2fdcc6d7a3fd2cfb4f5547b241dda56
                                                                                              • Instruction Fuzzy Hash: EB513870A047218BDB58DF69C8C074AB7A6BF65318F05896CECA69B305D735EC41CF91
                                                                                              APIs
                                                                                              • GetStartupInfoA.KERNEL32(?), ref: 0040389D
                                                                                              • GetFileType.KERNEL32(00000800), ref: 00403943
                                                                                              • GetStdHandle.KERNEL32(-000000F6), ref: 0040399C
                                                                                              • GetFileType.KERNEL32(00000000), ref: 004039AA
                                                                                              • SetHandleCount.KERNEL32 ref: 004039E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileHandleType$CountInfoStartup
                                                                                              • String ID:
                                                                                              • API String ID: 1710529072-0
                                                                                              • Opcode ID: f9f6c698642d398b554f84be3c90f4064283888af6bbc673017cb63da6670b61
                                                                                              • Instruction ID: 825ec877f99b7629084fcbf2355a8090dcaf6ef966e66130ad5ff06318bbd0a8
                                                                                              • Opcode Fuzzy Hash: f9f6c698642d398b554f84be3c90f4064283888af6bbc673017cb63da6670b61
                                                                                              • Instruction Fuzzy Hash: 125125B15046018FD7208F29C988B667F98BB02736F15873AE492FB3E1D7BC9A05C709
                                                                                              APIs
                                                                                                • Part of subcall function 60904396: sqlite3_mutex_try.SQLITE3(?,?,?,60908235), ref: 609043B8
                                                                                              • sqlite3_mutex_enter.SQLITE3 ref: 6093A114
                                                                                              • sqlite3_mutex_free.SQLITE3 ref: 6093A152
                                                                                              • sqlite3_mutex_leave.SQLITE3 ref: 6093A162
                                                                                              • sqlite3_free.SQLITE3 ref: 6093A1A4
                                                                                              • sqlite3_free.SQLITE3 ref: 6093A1C3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_free$sqlite3_mutex_entersqlite3_mutex_freesqlite3_mutex_leavesqlite3_mutex_try
                                                                                              • String ID:
                                                                                              • API String ID: 1894464702-0
                                                                                              • Opcode ID: 7188b9a67afd66d207271078c150a83da37f36a2752b1b5804700c826a798ba9
                                                                                              • Instruction ID: 8ebadd1dc7ee404a0f141fd21885e91e0aa1156a5a6df10951b92a0b718128ce
                                                                                              • Opcode Fuzzy Hash: 7188b9a67afd66d207271078c150a83da37f36a2752b1b5804700c826a798ba9
                                                                                              • Instruction Fuzzy Hash: CF313C70B086118BDB18DF79C8C1A1A7BFBBFB2704F148468E8418B219EB35DC419F91
                                                                                              APIs
                                                                                                • Part of subcall function 60925326: sqlite3_log.SQLITE3 ref: 60925352
                                                                                              • sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,609254CC), ref: 6092538E
                                                                                              • sqlite3_mutex_leave.SQLITE3 ref: 609253C4
                                                                                              • sqlite3_log.SQLITE3 ref: 609253E2
                                                                                              • sqlite3_log.SQLITE3 ref: 60925406
                                                                                              • sqlite3_mutex_leave.SQLITE3 ref: 60925443
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_log$sqlite3_mutex_leave$sqlite3_mutex_enter
                                                                                              • String ID:
                                                                                              • API String ID: 3336957480-0
                                                                                              • Opcode ID: 1198911827aa14b9fab328e6e7c73bc961b2278be0ca20fe6461460b1b30ceeb
                                                                                              • Instruction ID: a100dd02d465b32589d57b5b9efe4db3cd483c3b5de54de748c9b161d5d001e2
                                                                                              • Opcode Fuzzy Hash: 1198911827aa14b9fab328e6e7c73bc961b2278be0ca20fe6461460b1b30ceeb
                                                                                              • Instruction Fuzzy Hash: D3315A70228704DBDB00EF28D49575ABBE6AFA1358F00886DE9948F36DD778C885DB02
                                                                                              APIs
                                                                                              • sqlite3_result_blob.SQLITE3 ref: 609613D0
                                                                                              • sqlite3_column_int.SQLITE3 ref: 6096143A
                                                                                              • sqlite3_data_count.SQLITE3 ref: 60961465
                                                                                              • sqlite3_column_value.SQLITE3 ref: 60961476
                                                                                              • sqlite3_result_value.SQLITE3 ref: 60961482
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_column_intsqlite3_column_valuesqlite3_data_countsqlite3_result_blobsqlite3_result_value
                                                                                              • String ID:
                                                                                              • API String ID: 3091402450-0
                                                                                              • Opcode ID: 15f5c91e7d752206cb5be57281081ebbda5684d1dfb7c3b21a78c03d1c189b87
                                                                                              • Instruction ID: 8b12398a3b1f37ca0d2e1a8d549e1f0529ecbd38da511dd0edd3444da8e5cc4d
                                                                                              • Opcode Fuzzy Hash: 15f5c91e7d752206cb5be57281081ebbda5684d1dfb7c3b21a78c03d1c189b87
                                                                                              • Instruction Fuzzy Hash: 72314DB19082058FDB00DF29C48064EB7F6FF65354F19856AE8999B361EB34E886CF81
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_mutex_entersqlite3_mutex_leave$sqlite3_free
                                                                                              • String ID:
                                                                                              • API String ID: 251237202-0
                                                                                              • Opcode ID: ee0aefbaff40cad113deb2524f723b57adfc4224f15c8691f87345bc20e459c1
                                                                                              • Instruction ID: 8e14962182cb4ba31828fc05f1b37fa5954e33605a362b2e641de35f96add61e
                                                                                              • Opcode Fuzzy Hash: ee0aefbaff40cad113deb2524f723b57adfc4224f15c8691f87345bc20e459c1
                                                                                              • Instruction Fuzzy Hash: 022137B46087158BC709AF68C48570ABBF6FFA5318F10895DEC958B345DB74E940CB82
                                                                                              APIs
                                                                                              • sqlite3_aggregate_context.SQLITE3 ref: 6091A31E
                                                                                              • sqlite3_value_text.SQLITE3 ref: 6091A349
                                                                                              • sqlite3_value_bytes.SQLITE3 ref: 6091A356
                                                                                              • sqlite3_value_text.SQLITE3 ref: 6091A37B
                                                                                              • sqlite3_value_bytes.SQLITE3 ref: 6091A387
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_value_bytessqlite3_value_text$sqlite3_aggregate_context
                                                                                              • String ID:
                                                                                              • API String ID: 4225432645-0
                                                                                              • Opcode ID: e7dd5294350f58c57afd4f2551108a775ab72f2657aaaf635efeb712e258985e
                                                                                              • Instruction ID: 24a20a1669ecabf1c8c9e0f75de4e20f6480f0c3e20d7f4799920e66bb4c3c2a
                                                                                              • Opcode Fuzzy Hash: e7dd5294350f58c57afd4f2551108a775ab72f2657aaaf635efeb712e258985e
                                                                                              • Instruction Fuzzy Hash: 3F21CF71B086588FDB009F29C48075E7BE7AFA4254F0484A8E894CF305EB34DC86CB91
                                                                                              APIs
                                                                                              • sqlite3_mutex_enter.SQLITE3(?,-00000200,?), ref: 6090359D
                                                                                              • sqlite3_mutex_leave.SQLITE3(?,-00000200,?), ref: 609035E0
                                                                                              • sqlite3_mutex_enter.SQLITE3(?,-00000200,?), ref: 609035F9
                                                                                              • sqlite3_mutex_leave.SQLITE3(?,-00000200,?), ref: 60903614
                                                                                              • sqlite3_free.SQLITE3(?,-00000200,?), ref: 6090361C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_mutex_entersqlite3_mutex_leave$sqlite3_free
                                                                                              • String ID:
                                                                                              • API String ID: 251237202-0
                                                                                              • Opcode ID: d176fa110bd2286076a254f1a84b89a7a2b75649dc4a807f2bdee778eef171d4
                                                                                              • Instruction ID: 98a7ce7f1ce2ff6a0e5ca4ca87ec4bf20a5c319c62b2fc6798152503390b0136
                                                                                              • Opcode Fuzzy Hash: d176fa110bd2286076a254f1a84b89a7a2b75649dc4a807f2bdee778eef171d4
                                                                                              • Instruction Fuzzy Hash: B211FE725186218BCB00EF7DC8C16197FE7FB66358F01491DE866D7362D73AD480AB42
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_log
                                                                                              • String ID: ($string or blob too big$|
                                                                                              • API String ID: 632333372-2398534278
                                                                                              • Opcode ID: 03236f3895d5fd10e60d1ff1eefb6ed02231b27a1c47450c0fb49d2dd58edd91
                                                                                              • Instruction ID: 3c3a64a58f66130c0c9aec06ea77be0954bd7b4098f3428da06b6372deec6608
                                                                                              • Opcode Fuzzy Hash: 03236f3895d5fd10e60d1ff1eefb6ed02231b27a1c47450c0fb49d2dd58edd91
                                                                                              • Instruction Fuzzy Hash: 5DC10CB5A043288FCB66CF28C981789B7BABB59304F1085D9E958A7345C775EF81CF40
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: Virtual$Protect$Query
                                                                                              • String ID: @
                                                                                              • API String ID: 3618607426-2766056989
                                                                                              • Opcode ID: a11a59528d98c4ff7ad69dfbc7d520f68a8f714e9ef4c31244658d91e7757f1c
                                                                                              • Instruction ID: 11fd3fd6c91f2e29dbdaed7331fdf7a08ef8f1da01c53322037319a40d79a89e
                                                                                              • Opcode Fuzzy Hash: a11a59528d98c4ff7ad69dfbc7d520f68a8f714e9ef4c31244658d91e7757f1c
                                                                                              • Instruction Fuzzy Hash: 003141B5E15208AFEB14DFA9D48158EFFF5EF99254F10852AE868E3310E371D940CB52
                                                                                              APIs
                                                                                              • sqlite3_malloc.SQLITE3 ref: 60928353
                                                                                                • Part of subcall function 60916FBA: sqlite3_initialize.SQLITE3(60912743,?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5), ref: 60916FC4
                                                                                              • sqlite3_realloc.SQLITE3 ref: 609283A0
                                                                                              • sqlite3_free.SQLITE3 ref: 609283B6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_freesqlite3_initializesqlite3_mallocsqlite3_realloc
                                                                                              • String ID: d
                                                                                              • API String ID: 211589378-2564639436
                                                                                              • Opcode ID: 4c34ce46e3d0a3d1d3def0d8ad382c8948c40f702370fc4fcdce263753dde11a
                                                                                              • Instruction ID: 0830c2115c9ea807631a831f7f1165b0ee40d8a8a94356aa67113494a68d5982
                                                                                              • Opcode Fuzzy Hash: 4c34ce46e3d0a3d1d3def0d8ad382c8948c40f702370fc4fcdce263753dde11a
                                                                                              • Instruction Fuzzy Hash: 222137B0A04205CFDB14DF59D4C078ABBF6FF69314F158469D8889B309E3B8E841CBA1
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressHandleModuleProc
                                                                                              • String ID: _Jv_RegisterClasses$libgcj-11.dll
                                                                                              • API String ID: 1646373207-2713375476
                                                                                              • Opcode ID: 84d528d321f1eea6d8a1b68cb749bb1a2441192a5c5952381cf667fabd413772
                                                                                              • Instruction ID: e6822cb61b404b68644b44a252d8259deade1a358cfa59fcc717d95409d4d83a
                                                                                              • Opcode Fuzzy Hash: 84d528d321f1eea6d8a1b68cb749bb1a2441192a5c5952381cf667fabd413772
                                                                                              • Instruction Fuzzy Hash: 0DE04F7062D30586FB443F794D923297AEB5F72549F00081CD9929B240EBB4D440D753
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(KERNEL32,004028E9), ref: 00402CCF
                                                                                              • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 00402CDF
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressHandleModuleProc
                                                                                              • String ID: IsProcessorFeaturePresent$KERNEL32
                                                                                              • API String ID: 1646373207-3105848591
                                                                                              • Opcode ID: d54598a83eb0baa68b6903309d995a9c08ead6f1cb52c8cdd87b98e358e571e4
                                                                                              • Instruction ID: 2adebd830dd3b14d64e79f2d4f5eff8f6aaaa0a0dfbfbc424d90c26f206a1370
                                                                                              • Opcode Fuzzy Hash: d54598a83eb0baa68b6903309d995a9c08ead6f1cb52c8cdd87b98e358e571e4
                                                                                              • Instruction Fuzzy Hash: 8EC01220388602ABFE902BB14F0EB2A21082F00B82F14407E6589F02C0CEBCC008903D
                                                                                              APIs
                                                                                              • HeapAlloc.KERNEL32(00000000,00002020,?,00000000,?,?,00403BAA), ref: 004047AD
                                                                                              • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,00000000,?,?,00403BAA), ref: 004047D1
                                                                                              • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,00000000,?,?,00403BAA), ref: 004047EB
                                                                                              • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,?,?,00403BAA), ref: 004048AC
                                                                                              • HeapFree.KERNEL32(00000000,00000000,?,00000000,?,?,00403BAA), ref: 004048C3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocVirtual$FreeHeap
                                                                                              • String ID:
                                                                                              • API String ID: 714016831-0
                                                                                              • Opcode ID: 40c1f36ec91e0fdcd34999e659656618bdbc287b61182469df63e7afeec0b04d
                                                                                              • Instruction ID: c10c021e120759eda6135e36457b27e0c23e5a43da849e4fe0a9db16ba58ca85
                                                                                              • Opcode Fuzzy Hash: 40c1f36ec91e0fdcd34999e659656618bdbc287b61182469df63e7afeec0b04d
                                                                                              • Instruction Fuzzy Hash: 453142B65007029BD3309F24DD40B26B7E0EB88B54F10CA3AEA95B76D1E778A8448F4C
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_free
                                                                                              • String ID:
                                                                                              • API String ID: 2313487548-0
                                                                                              • Opcode ID: 17c4197e66eccf8e4e539c70c01e6b2d08fb8491bcf73b2b2b780fd64eb57762
                                                                                              • Instruction ID: 4e09bb13dd5a3c3c1d339de95b14bc5918580ae4e3dbdcf066e72e084d482625
                                                                                              • Opcode Fuzzy Hash: 17c4197e66eccf8e4e539c70c01e6b2d08fb8491bcf73b2b2b780fd64eb57762
                                                                                              • Instruction Fuzzy Hash: 15E14674928209EFDB04CF94D184B9EBBB2FF69304F208558D8956B259D774EC86CF81
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: sqlite_master$sqlite_sequence$sqlite_temp_master
                                                                                              • API String ID: 0-1177837799
                                                                                              • Opcode ID: b45b6970ebe54efa46efcb65f0e1138f7cff2b55d537d73117a3441f01693427
                                                                                              • Instruction ID: e5240d50caebec33bd4ce83d4b9fb982fe545a794019e3d400788b6e3ec19482
                                                                                              • Opcode Fuzzy Hash: b45b6970ebe54efa46efcb65f0e1138f7cff2b55d537d73117a3441f01693427
                                                                                              • Instruction Fuzzy Hash: F7C13974B062089BDB05DF68D49179EBBF3AFA8308F14C42DE8899B345DB39D841CB41
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_freesqlite3_mallocsqlite3_value_bytessqlite3_value_text
                                                                                              • String ID:
                                                                                              • API String ID: 1648232842-0
                                                                                              • Opcode ID: 6f401334500cf3ce8937f97dce09bc9131fc1f686c7391f4db805f1c2cabf22c
                                                                                              • Instruction ID: a01add595a6c287de5924383f0ed77e5cc34082cd65fcd393cbe5beac3228527
                                                                                              • Opcode Fuzzy Hash: 6f401334500cf3ce8937f97dce09bc9131fc1f686c7391f4db805f1c2cabf22c
                                                                                              • Instruction Fuzzy Hash: 4531C0B4A042058FDB04DF29C094B5ABBE2FF98354F1484A9EC498F349D779E846CBA0
                                                                                              APIs
                                                                                              • sqlite3_step.SQLITE3 ref: 609614AB
                                                                                              • sqlite3_reset.SQLITE3 ref: 609614BF
                                                                                                • Part of subcall function 60941C40: sqlite3_mutex_enter.SQLITE3 ref: 60941C58
                                                                                                • Part of subcall function 60941C40: sqlite3_mutex_leave.SQLITE3 ref: 60941CBE
                                                                                              • sqlite3_column_int64.SQLITE3 ref: 609614D4
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_column_int64sqlite3_mutex_entersqlite3_mutex_leavesqlite3_resetsqlite3_step
                                                                                              • String ID:
                                                                                              • API String ID: 3429445273-0
                                                                                              • Opcode ID: 44b7ea0f60ccad0bdb665534712f35195a3185c30aa33eaed9220a178cd48643
                                                                                              • Instruction ID: 62863439de2fabb71fd3664abc4fbfc11ff04353a6e6e3e42574d1c19fb7889d
                                                                                              • Opcode Fuzzy Hash: 44b7ea0f60ccad0bdb665534712f35195a3185c30aa33eaed9220a178cd48643
                                                                                              • Instruction Fuzzy Hash: AE316470A183408BEF15CF69C1C5749FBA6AFA7348F188599DC864F30AD375D884C752
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_snprintf$sqlite3_stricmpsqlite3_value_text
                                                                                              • String ID:
                                                                                              • API String ID: 1035992805-0
                                                                                              • Opcode ID: 213593095aed0ecc64844f89ed1f3878beaaf7633e295caa013ed5846923251b
                                                                                              • Instruction ID: 84d28b158f1a11e063f70be148de9c7b2eff514b3bcf7808f17aa895500be78a
                                                                                              • Opcode Fuzzy Hash: 213593095aed0ecc64844f89ed1f3878beaaf7633e295caa013ed5846923251b
                                                                                              • Instruction Fuzzy Hash: 8C3178B0A08324DFEB24CF28C481B4ABBF6FBA5318F04C499E4888B251C775D885DF42
                                                                                              APIs
                                                                                              • sqlite3_mutex_enter.SQLITE3(-00000200,?,?,6090B22B), ref: 609034D8
                                                                                              • sqlite3_mutex_leave.SQLITE3(-00000200,?,?,6090B22B), ref: 60903521
                                                                                              • sqlite3_mutex_enter.SQLITE3(-00000200,?,?,6090B22B), ref: 6090354A
                                                                                              • sqlite3_mutex_leave.SQLITE3(-00000200,?,?,6090B22B), ref: 60903563
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_mutex_entersqlite3_mutex_leave
                                                                                              • String ID:
                                                                                              • API String ID: 1477753154-0
                                                                                              • Opcode ID: cc0b0c4414a91b2c8747a1fff16426ed14613a144e31e5ae299e51467139190c
                                                                                              • Instruction ID: 848dca46e936c6e01d33e08870ae11aa620bd8b24bdb606da7ea596206f2e213
                                                                                              • Opcode Fuzzy Hash: cc0b0c4414a91b2c8747a1fff16426ed14613a144e31e5ae299e51467139190c
                                                                                              • Instruction Fuzzy Hash: 44111F726186218FDB00EF7DC8817597FEAFB66308F00842DE865E7362E779D8819741
                                                                                              APIs
                                                                                              • sqlite3_initialize.SQLITE3 ref: 6092A450
                                                                                                • Part of subcall function 60912453: sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 609124D1
                                                                                              • sqlite3_mutex_enter.SQLITE3 ref: 6092A466
                                                                                              • sqlite3_mutex_leave.SQLITE3 ref: 6092A47F
                                                                                              • sqlite3_memory_used.SQLITE3 ref: 6092A4BA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_mutex_enter$sqlite3_initializesqlite3_memory_usedsqlite3_mutex_leave
                                                                                              • String ID:
                                                                                              • API String ID: 2673540737-0
                                                                                              • Opcode ID: 58333c90df1895ca2798dafcbab41657529afc007f85020e925d8580cfdcdfcb
                                                                                              • Instruction ID: c4988029ba64cfb2248a7cf0c790324acf4c13eb0f9cd3f15fdedc175ef3c91a
                                                                                              • Opcode Fuzzy Hash: 58333c90df1895ca2798dafcbab41657529afc007f85020e925d8580cfdcdfcb
                                                                                              • Instruction Fuzzy Hash: F9019276E143148BCB00EF79D88561ABFE7FBA5324F008528EC9497364E735DC408B81
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_value_text$sqlite3_freesqlite3_load_extension
                                                                                              • String ID:
                                                                                              • API String ID: 3526213481-0
                                                                                              • Opcode ID: e69664dddad2286ff6ed0cb1f1c7a121e5262b7aa8061cf10291ac83704fea4b
                                                                                              • Instruction ID: 98199466554994e62e20ad809be6129e3c08b78dd6d8c38fc18f61524e73aad2
                                                                                              • Opcode Fuzzy Hash: e69664dddad2286ff6ed0cb1f1c7a121e5262b7aa8061cf10291ac83704fea4b
                                                                                              • Instruction Fuzzy Hash: 4101E9B5A043059BCB00EF69D485AAFBBF5EF68654F10C529EC9497304E774D841CF91
                                                                                              APIs
                                                                                              • sqlite3_prepare.SQLITE3 ref: 60969166
                                                                                              • sqlite3_errmsg.SQLITE3 ref: 60969172
                                                                                                • Part of subcall function 609258A8: sqlite3_log.SQLITE3 ref: 609258E5
                                                                                              • sqlite3_errcode.SQLITE3 ref: 6096918A
                                                                                                • Part of subcall function 609251AA: sqlite3_log.SQLITE3 ref: 609251E8
                                                                                              • sqlite3_step.SQLITE3 ref: 60969197
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_log$sqlite3_errcodesqlite3_errmsgsqlite3_preparesqlite3_step
                                                                                              • String ID:
                                                                                              • API String ID: 2877408194-0
                                                                                              • Opcode ID: 06185e76a961c89383dca1620ea17d5683e825aa4cba78efc797247d66345ea8
                                                                                              • Instruction ID: d4ebd4c9a05a553e526e78eaaf80584f3afcfe73b3175c4c6dada352db343273
                                                                                              • Opcode Fuzzy Hash: 06185e76a961c89383dca1620ea17d5683e825aa4cba78efc797247d66345ea8
                                                                                              • Instruction Fuzzy Hash: 9F0186B091C3059BE700EF29C88525DFBE9EFA5314F11892DA89987384E734C940CB86
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_freesqlite3_mprintfsqlite3_value_blobsqlite3_value_bytes
                                                                                              • String ID:
                                                                                              • API String ID: 1163609955-0
                                                                                              • Opcode ID: c446836a4840d302dbdc97fcf3f25a19881b43244be54ce00609cbc101420811
                                                                                              • Instruction ID: 8e0d1a1b7fe9adeaf330fda5a565ce202833de3a42fcd494fa905fee92021967
                                                                                              • Opcode Fuzzy Hash: c446836a4840d302dbdc97fcf3f25a19881b43244be54ce00609cbc101420811
                                                                                              • Instruction Fuzzy Hash: F6F0C8716282145FC3106F3994816697BE6DFA6758F0144A9F584CB314DB75CC82C742
                                                                                              APIs
                                                                                              • sqlite3_prepare_v2.SQLITE3 ref: 609615BA
                                                                                              • sqlite3_step.SQLITE3 ref: 609615C9
                                                                                              • sqlite3_column_int.SQLITE3 ref: 609615E1
                                                                                                • Part of subcall function 6091D4F4: sqlite3_value_int.SQLITE3 ref: 6091D50C
                                                                                              • sqlite3_finalize.SQLITE3 ref: 609615EE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_column_intsqlite3_finalizesqlite3_prepare_v2sqlite3_stepsqlite3_value_int
                                                                                              • String ID:
                                                                                              • API String ID: 4265739436-0
                                                                                              • Opcode ID: edb1a347b7ee41d63e69a54b369763b34702b79c0c254a7699785c0090147395
                                                                                              • Instruction ID: 970f7a8085286b868af170b9ae73916577c28f03d50975cfa6e3c5bd991c66ad
                                                                                              • Opcode Fuzzy Hash: edb1a347b7ee41d63e69a54b369763b34702b79c0c254a7699785c0090147395
                                                                                              • Instruction Fuzzy Hash: BE01E4B0D083049BEB10EF69C58575EFBF9EFA5314F00896DE8A997380E775D9408B82
                                                                                              APIs
                                                                                              • sqlite3_mutex_enter.SQLITE3 ref: 609084E9
                                                                                              • sqlite3_mutex_leave.SQLITE3 ref: 60908518
                                                                                              • sqlite3_mutex_enter.SQLITE3 ref: 60908528
                                                                                              • sqlite3_mutex_leave.SQLITE3 ref: 6090855B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_mutex_entersqlite3_mutex_leave
                                                                                              • String ID:
                                                                                              • API String ID: 1477753154-0
                                                                                              • Opcode ID: dbb0a767127359d75753d9f151f7b9e03affe710ab86404e29d94d971225fba8
                                                                                              • Instruction ID: c41a4d3f3efa942db11cbd34a9101edfe28f26dd6f673ba1da0d5803e4a0adbd
                                                                                              • Opcode Fuzzy Hash: dbb0a767127359d75753d9f151f7b9e03affe710ab86404e29d94d971225fba8
                                                                                              • Instruction Fuzzy Hash: FD01A4B05093048BDB40AF25C5D97CABBA5EF15718F0884BDEC894F34AD7B9D5448BA1
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_log
                                                                                              • String ID: into$out of
                                                                                              • API String ID: 632333372-1114767565
                                                                                              • Opcode ID: 05e60a680804dc8d75cc30d301a58b6784d3cbcabfb13c7dcba40214300a3b29
                                                                                              • Instruction ID: de20b162988cb891a2f8fbcf22309076e3e21d241eadb06c465d82de9f0e8d92
                                                                                              • Opcode Fuzzy Hash: 05e60a680804dc8d75cc30d301a58b6784d3cbcabfb13c7dcba40214300a3b29
                                                                                              • Instruction Fuzzy Hash: 91910170A043149BDB26CF28C88175EBBBABF65308F0481E9E858AB355D7B5DE85CF41
                                                                                              APIs
                                                                                                • Part of subcall function 60918408: sqlite3_value_text.SQLITE3 ref: 60918426
                                                                                              • sqlite3_free.SQLITE3 ref: 609193A3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_freesqlite3_value_text
                                                                                              • String ID: (NULL)$NULL
                                                                                              • API String ID: 2175239460-873412390
                                                                                              • Opcode ID: 2d639d8f8789be8f4f2115c7e339461789bfa1512606a4b94e85873a15b94a2d
                                                                                              • Instruction ID: 63658e955800b40111a930d2026d12727b3b294c4be858d68b3f7c51d7abf176
                                                                                              • Opcode Fuzzy Hash: 2d639d8f8789be8f4f2115c7e339461789bfa1512606a4b94e85873a15b94a2d
                                                                                              • Instruction Fuzzy Hash: E3514B31F0825A8EEB258A68C89479DBBB6BF66304F1441E9C4A9AB241D7309DC6CF01
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_log
                                                                                              • String ID: -- $d
                                                                                              • API String ID: 632333372-777087308
                                                                                              • Opcode ID: 2197877c990d2cc598be623123ad695ba2ed3a88a0fc98749b4c643aad0a3996
                                                                                              • Instruction ID: d45f625f7ed72e8bd0cbe86fb5af212c953cff4c7e5ffbb26f6c4a79540968e1
                                                                                              • Opcode Fuzzy Hash: 2197877c990d2cc598be623123ad695ba2ed3a88a0fc98749b4c643aad0a3996
                                                                                              • Instruction Fuzzy Hash: FB51F674A043689BDB26CF28C980789BBFABF55304F1481D9E89CAB341C7759E85CF40
                                                                                              APIs
                                                                                              • GetCPInfo.KERNEL32(?,00000000), ref: 00405BB3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: Info
                                                                                              • String ID: $
                                                                                              • API String ID: 1807457897-3032137957
                                                                                              • Opcode ID: d62f257e1640a576e7c9989f97778ac9c58cbb7090796bbb9a31cafd0bd77437
                                                                                              • Instruction ID: d944e0326c6926f7701021ceed1c995ec26cf4905102b61f872e2d2972a5c282
                                                                                              • Opcode Fuzzy Hash: d62f257e1640a576e7c9989f97778ac9c58cbb7090796bbb9a31cafd0bd77437
                                                                                              • Instruction Fuzzy Hash: 824168300186589AFB119724CD89BFB3FA9EB05B00F1400FAD586FB1D2C2394954DFAA
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_log
                                                                                              • String ID: string or blob too big$|
                                                                                              • API String ID: 632333372-330586046
                                                                                              • Opcode ID: b6301cf988e6664baaa8b4960c9a349f418ad1f33ca54faa928bbeacb0d503e6
                                                                                              • Instruction ID: 65a9847582dc10a4f4f17f1c4fc8d82f10366072c52f03016cacc5a11d353e3e
                                                                                              • Opcode Fuzzy Hash: b6301cf988e6664baaa8b4960c9a349f418ad1f33ca54faa928bbeacb0d503e6
                                                                                              • Instruction Fuzzy Hash: 4D51B9749083689BCB22CF28C985789BBF6BF59314F1086D9E49897351C775EE81CF41
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_log
                                                                                              • String ID: d$|
                                                                                              • API String ID: 632333372-415524447
                                                                                              • Opcode ID: b41da94c8e0873fb31ce46b9bf1ec845f2d469f37e36bd2a55cc8f8885e561b5
                                                                                              • Instruction ID: dac03e427e93f591f5d1737f90c886445feec93ea56e6f6f32424ebbe55d5cce
                                                                                              • Opcode Fuzzy Hash: b41da94c8e0873fb31ce46b9bf1ec845f2d469f37e36bd2a55cc8f8885e561b5
                                                                                              • Instruction Fuzzy Hash: 50510970A04329DBDB26CF19C981799BBBABF55308F0481D9E958AB341D735EE81CF41
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_logsqlite3_value_text
                                                                                              • String ID: string or blob too big
                                                                                              • API String ID: 2320820228-2803948771
                                                                                              • Opcode ID: 4552165c49a92a3f1eebbde7746405f837ee0ef0562a3825501d2540ddfe4a5c
                                                                                              • Instruction ID: 1f8da1134a73d261049fdcd83983d84c916c8a3f87851362e697cdb17b1d2bab
                                                                                              • Opcode Fuzzy Hash: 4552165c49a92a3f1eebbde7746405f837ee0ef0562a3825501d2540ddfe4a5c
                                                                                              • Instruction Fuzzy Hash: F631D9B0A083249BCB25DF28C881799B7FABF69304F0085DAE898A7301D775DE81CF45
                                                                                              APIs
                                                                                              • sqlite3_aggregate_context.SQLITE3 ref: 60914096
                                                                                              • sqlite3_value_numeric_type.SQLITE3 ref: 609140A2
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_aggregate_contextsqlite3_value_numeric_type
                                                                                              • String ID:
                                                                                              • API String ID: 3265351223-3916222277
                                                                                              • Opcode ID: 46809e466d9dc696839b8d734d1d71a7cd961db8d22299a3a9f395bc6b436a6c
                                                                                              • Instruction ID: a3c0f903ff645dd1c5a8146eaa2078e963ad6c1b8d1bbf61d5d4caeb1888773d
                                                                                              • Opcode Fuzzy Hash: 46809e466d9dc696839b8d734d1d71a7cd961db8d22299a3a9f395bc6b436a6c
                                                                                              • Instruction Fuzzy Hash: 19119EB0A0C6589BDF059F69C4D539A7BF6AF39308F0044E8D8D08B205E771CD94CB81
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_stricmp
                                                                                              • String ID: log
                                                                                              • API String ID: 912767213-2403297477
                                                                                              • Opcode ID: 32625358f7d37366d1c1d188942de81712d107425b8b720a67b4b84d1adec0cd
                                                                                              • Instruction ID: cbf508da25866b0a35bc2ca480d64d7c482f0664b0359b741109bd545b4f9ff5
                                                                                              • Opcode Fuzzy Hash: 32625358f7d37366d1c1d188942de81712d107425b8b720a67b4b84d1adec0cd
                                                                                              • Instruction Fuzzy Hash: FD11DAB07087048BE725AF66C49535EBBB3ABA1708F10C42CE4854B784C7BAC986DB42
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_strnicmp
                                                                                              • String ID: SQLITE_
                                                                                              • API String ID: 1961171630-787686576
                                                                                              • Opcode ID: 6b56a851e7df47422a7a29131339b4dfcb3302745a705f9abe90012807219487
                                                                                              • Instruction ID: 6d5ef3c0fd507030b5e8170497320435726bf3f0db30f2d6f2734bcd7f756fb3
                                                                                              • Opcode Fuzzy Hash: 6b56a851e7df47422a7a29131339b4dfcb3302745a705f9abe90012807219487
                                                                                              • Instruction Fuzzy Hash: 2501D6B190C3505FD7419F29CC8075BBFFAEBA5258F10486DE89687212D374DC81D781
                                                                                              APIs
                                                                                              • sqlite3_value_bytes.SQLITE3 ref: 6091A1DB
                                                                                              • sqlite3_value_blob.SQLITE3 ref: 6091A1FA
                                                                                              Strings
                                                                                              • Invalid argument to rtreedepth(), xrefs: 6091A1E3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_value_blobsqlite3_value_bytes
                                                                                              • String ID: Invalid argument to rtreedepth()
                                                                                              • API String ID: 1063208240-2843521569
                                                                                              • Opcode ID: 11a8b631faa983fdd1b04a57150add771201859657fb9a8a7ca9793758d49f10
                                                                                              • Instruction ID: c9489564a96cd83e586e3a08c251b8a8c74d553169181c25a19da25ffef599d7
                                                                                              • Opcode Fuzzy Hash: 11a8b631faa983fdd1b04a57150add771201859657fb9a8a7ca9793758d49f10
                                                                                              • Instruction Fuzzy Hash: 0FF0A4B2A0C2589BDB00AF2CC88255577A6FF24258F1045D9E9858F306EB34DDD5C7D1
                                                                                              APIs
                                                                                              • sqlite3_soft_heap_limit64.SQLITE3 ref: 609561D7
                                                                                                • Part of subcall function 6092A43E: sqlite3_initialize.SQLITE3 ref: 6092A450
                                                                                                • Part of subcall function 6092A43E: sqlite3_mutex_enter.SQLITE3 ref: 6092A466
                                                                                                • Part of subcall function 6092A43E: sqlite3_mutex_leave.SQLITE3 ref: 6092A47F
                                                                                                • Part of subcall function 6092A43E: sqlite3_memory_used.SQLITE3 ref: 6092A4BA
                                                                                              • sqlite3_soft_heap_limit64.SQLITE3 ref: 609561EB
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_soft_heap_limit64$sqlite3_initializesqlite3_memory_usedsqlite3_mutex_entersqlite3_mutex_leave
                                                                                              • String ID: soft_heap_limit
                                                                                              • API String ID: 1251656441-405162809
                                                                                              • Opcode ID: 0a3178e3d5348c0d1dba646aca47308acc52713326f376e4eba91e5107f5ba07
                                                                                              • Instruction ID: 8891d4bbc0f5aef5547f00e3070395c34840fc2012d087b050684f6162b0ba7d
                                                                                              • Opcode Fuzzy Hash: 0a3178e3d5348c0d1dba646aca47308acc52713326f376e4eba91e5107f5ba07
                                                                                              • Instruction Fuzzy Hash: C2014B71A083188BC710EF98D8417ADB7F2BFA5318F508629E8A49B394D730DC42CF41
                                                                                              APIs
                                                                                              • sqlite3_log.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,6094A57F), ref: 6092522A
                                                                                              • sqlite3_log.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,6094A57F), ref: 60925263
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: sqlite3_log
                                                                                              • String ID: NULL
                                                                                              • API String ID: 632333372-324932091
                                                                                              • Opcode ID: f56f6a0e8a895df1b0101c46b9851dc3af9ce5b0d95800d46be4b721d61d1ab1
                                                                                              • Instruction ID: 5a36de60e8574ea04015b231464f09686a41744340efbe7a8a869d8181b3dc96
                                                                                              • Opcode Fuzzy Hash: f56f6a0e8a895df1b0101c46b9851dc3af9ce5b0d95800d46be4b721d61d1ab1
                                                                                              • Instruction Fuzzy Hash: BAF0A070238301DBD7102FA6E44230E7AEBABB0798F48C43C95A84F289D7B5C844CB63
                                                                                              APIs
                                                                                              • HeapReAlloc.KERNEL32(00000000,00000050,?,00000000,004043A8,?,?,?,00000100,?,00000000), ref: 00404608
                                                                                              • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,004043A8,?,?,?,00000100,?,00000000), ref: 0040463C
                                                                                              • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,00000000,004043A8,?,?,?,00000100,?,00000000), ref: 00404656
                                                                                              • HeapFree.KERNEL32(00000000,?,?,00000000,004043A8,?,?,?,00000100,?,00000000), ref: 0040466D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2544917884.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2544917884.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocHeap$FreeVirtual
                                                                                              • String ID:
                                                                                              • API String ID: 3499195154-0
                                                                                              • Opcode ID: 89e6c41d760d97d5fcc59a371cb6f4e80e60aa6d464a71aa99f6417c7b537c35
                                                                                              • Instruction ID: 2adbec297c34dc3d5fc58a6281b1bdaad71761cfda4098cfa9d0d345734132fa
                                                                                              • Opcode Fuzzy Hash: 89e6c41d760d97d5fcc59a371cb6f4e80e60aa6d464a71aa99f6417c7b537c35
                                                                                              • Instruction Fuzzy Hash: 2D114C70250701DFD7308F28EE85E127BB5F7867207108B3DEAA1E25E0D7359845CB08
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: CriticalSection$EnterLeavefree
                                                                                              • String ID:
                                                                                              • API String ID: 4020351045-0
                                                                                              • Opcode ID: 13d179c58506242de641c1793229aaf6d73ae3266bd26a3d41fb94aeb54caf06
                                                                                              • Instruction ID: 980a39aab3b848caec2c27f45d5308e77b440585e3cd6ccd446b63c63d51e1b6
                                                                                              • Opcode Fuzzy Hash: 13d179c58506242de641c1793229aaf6d73ae3266bd26a3d41fb94aeb54caf06
                                                                                              • Instruction Fuzzy Hash: 2D018070B293058BDB10DF28C985919BBFBABB6308B20855CE499D7355D770DC80EB62
                                                                                              APIs
                                                                                              • EnterCriticalSection.KERNEL32(?,?,?,6096D655,?,?,?,?,?,6096CF88), ref: 6096D4DF
                                                                                              • TlsGetValue.KERNEL32(?,?,?,?,6096D655,?,?,?,?,?,6096CF88), ref: 6096D4F5
                                                                                              • GetLastError.KERNEL32(?,?,?,?,?,6096D655,?,?,?,?,?,6096CF88), ref: 6096D4FD
                                                                                              • LeaveCriticalSection.KERNEL32(?,?,?,?,6096D655,?,?,?,?,?,6096CF88), ref: 6096D520
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2548804801.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2548784719.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549067075.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549089268.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549243840.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549267381.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2549286262.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                              Similarity
                                                                                              • API ID: CriticalSection$EnterErrorLastLeaveValue
                                                                                              • String ID:
                                                                                              • API String ID: 682475483-0
                                                                                              • Opcode ID: 79e4c3a08b5363d98cc33068bb7bbdcd271105d9d9d9c252471cf05fac27a945
                                                                                              • Instruction ID: 6dd43474153c21470d2d90641e64b96ed0da30414b2d41baa8b5e8831fa3fcb2
                                                                                              • Opcode Fuzzy Hash: 79e4c3a08b5363d98cc33068bb7bbdcd271105d9d9d9c252471cf05fac27a945
                                                                                              • Instruction Fuzzy Hash: 9AF0F972A163104BEB10AF659CC1A5A7BFDEFB1218F100048FC6197354E770DC40D6A2